CVE-2015-5736
Fortinet FortiClient <5.2.4 - RCE
Title source: llmDescription
The Fortishield.sys driver in Fortinet FortiClient before 5.2.4 allows local users to execute arbitrary code with kernel privileges by setting the callback function in a (1) 0x220024 or (2) 0x220028 ioctl call.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by sickness · clocalwindows_x86-64
https://www.exploit-db.com/exploits/41721
exploitdb
WORKING POC
VERIFIED
by sickness · clocalwindows_x86-64
https://www.exploit-db.com/exploits/41722
exploitdb
WORKING POC
VERIFIED
by sickness & mschenk · c++localwindows_x86-64
https://www.exploit-db.com/exploits/45149
References (10)
Scores
EPSS
0.0255
EPSS Percentile
85.2%
Classification
CWE
CWE-264
Status
draft
Affected Products (1)
fortinet/forticlient
< 5.2.3
Timeline
Published
Sep 03, 2015
Tracked Since
Feb 18, 2026