Cyber Posture

CVE-2020-9295

Medium

Published: 17 March 2025

Published
17 March 2025
Modified
14 August 2025
KEV Added
Patch
CVSS Score 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
EPSS Score 0.0030 53.3th percentile
Risk Priority 10 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-9295 is a medium-severity Improperly Implemented Security Check for Standard (CWE-358) vulnerability in Fortinet Antivirus Engine. Its CVSS base score is 4.7 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Disable or Modify Tools (T1685); ranked in the top 46.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-3 (Malicious Code Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Disable or Modify Tools (T1685). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2020-9295 by requiring timely remediation of the flaw in the antivirus engine through patching to newer AV engine versions in affected FortiOS and FortiClient products.

prevent

Addresses the vulnerability by mandating deployment, updating, and configuration of malicious code protection mechanisms, including enabling Virus Outbreak Prevention on FortiGate and real-time scanning on FortiClient to detect malicious RAR archives.

prevent

Ensures organizations receive and act on vendor advisories like the FortiGuard PSIRT advisory for CVE-2020-9295, facilitating prompt updates to vulnerable antivirus engine versions.

MITRE ATT&CK Enterprise TechniquesAI

T1685 Disable or Modify Tools Defense Impairment
Adversaries may disable, degrade, or tamper with security tools or applications (e.
Why these techniques?

The vulnerability allows bypassing initial AV detection for malformed RAR archives containing malicious files, facilitating evasion of security tools.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

NVD Description

FortiOS 6.2 running AV engine version 6.00142 and below, FortiOS 6.4 running AV engine version 6.00144 and below and FortiClient 6.2 running AV engine version 6.00137 and below may not immediately detect certain types of malformed or non-standard RAR archives,…

more

potentially containing malicious files. Based on the samples provided, FortiClient will detect the malicious files upon trying extraction by real-time scanning and FortiGate will detect the malicious archive if Virus Outbreak Prevention is enabled.

Deeper analysisAI

CVE-2020-9295 is a vulnerability in the antivirus engine of certain Fortinet products that causes failure to immediately detect specific malformed or non-standard RAR archives potentially containing malicious files. It affects FortiOS 6.2 running AV engine version 6.00142 and below, FortiOS 6.4 running AV engine version 6.00144 and below, and FortiClient 6.2 running AV engine version 6.00137 and below.

A remote, unauthenticated attacker can exploit this over the network with low attack complexity by tricking a user into interacting with the malicious RAR archive, such as attempting to open or process it. This bypasses the initial detection scan, resulting in low integrity impact with a changed scope, as reflected in the CVSS v3.1 base score of 4.7 (AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). While exploitation requires user interaction, FortiClient will detect the malicious files during extraction via real-time scanning, and FortiGate will detect the archive if Virus Outbreak Prevention is enabled.

Mitigation details are available in the FortiGuard PSIRT advisory at https://fortiguard.com/psirt/FG-IR-20-037.

Details

CWE(s)

Affected Products

fortinet
antivirus engine
≤ 6.00145 · ≤ 6.00145

CVEs Like This One

CVE-2026-22153Same product: Fortinet Fortios
CVE-2025-64157Same product: Fortinet Fortios
CVE-2024-40591Same product: Fortinet Fortios
CVE-2024-52968Same product: Fortinet Forticlient
CVE-2024-46668Same product: Fortinet Fortios
CVE-2024-46670Same product: Fortinet Fortios
CVE-2024-35279Same product: Fortinet Fortios
CVE-2026-24018Same product: Fortinet Forticlient
CVE-2025-62676Same product: Fortinet Forticlient
CVE-2025-53847Same product: Fortinet Fortios

References