CVE-2015-5736

Fortinet FortiClient <5.2.4 - RCE

Title source: llm

Description

The Fortishield.sys driver in Fortinet FortiClient before 5.2.4 allows local users to execute arbitrary code with kernel privileges by setting the callback function in a (1) 0x220024 or (2) 0x220028 ioctl call.

Exploits (4)

exploitdb WORKING POC VERIFIED
by sickness & mschenk · c++localwindows_x86-64
https://www.exploit-db.com/exploits/45149
exploitdb WORKING POC VERIFIED
by sickness · clocalwindows_x86-64
https://www.exploit-db.com/exploits/41721
exploitdb WORKING POC VERIFIED
by sickness · clocalwindows_x86-64
https://www.exploit-db.com/exploits/41722
nomisec WORKING POC 3 stars
by avielzecharia · poc
https://github.com/avielzecharia/CVE-2015-5736

Scores

EPSS 0.0255
EPSS Percentile 85.5%

Details

CWE
CWE-264
Status published
Products (1)
fortinet/forticlient < 5.2.3
Published Sep 03, 2015
Tracked Since Feb 18, 2026