CVE-2015-5736

Fortinet FortiClient <5.2.4 - RCE

Title source: llm

Description

The Fortishield.sys driver in Fortinet FortiClient before 5.2.4 allows local users to execute arbitrary code with kernel privileges by setting the callback function in a (1) 0x220024 or (2) 0x220028 ioctl call.

Exploits (4)

nomisec WORKING POC 3 stars
by avielzecharia · poc
https://github.com/avielzecharia/CVE-2015-5736
exploitdb WORKING POC VERIFIED
by sickness · clocalwindows_x86-64
https://www.exploit-db.com/exploits/41721
exploitdb WORKING POC VERIFIED
by sickness · clocalwindows_x86-64
https://www.exploit-db.com/exploits/41722
exploitdb WORKING POC VERIFIED
by sickness & mschenk · c++localwindows_x86-64
https://www.exploit-db.com/exploits/45149

Scores

EPSS 0.0255
EPSS Percentile 85.2%

Classification

CWE
CWE-264
Status draft

Affected Products (1)

fortinet/forticlient < 5.2.3

Timeline

Published Sep 03, 2015
Tracked Since Feb 18, 2026