CVE-2026-24018
Published: 10 March 2026
Summary
CVE-2026-24018 is a high-severity UNIX Symbolic Link (Symlink) Following (CWE-61) vulnerability in Fortinet Forticlient. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 4.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Flaw remediation directly prevents exploitation of CVE-2026-24018 by applying Fortinet patches that correct the symlink following vulnerability in FortiClientLinux.
Least privilege restricts the scope of privilege escalation possible via symlink manipulation by ensuring FortiClientLinux processes operate with minimal necessary permissions.
Access enforcement ensures proper authorization checks during file operations, mitigating symlink traversal that bypasses controls in privileged FortiClientLinux components.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct local privilege escalation via symlink following vulnerability (CWE-61) in a privileged process, matching Exploitation for Privilege Escalation.
NVD Description
A UNIX symbolic link (Symlink) following vulnerability in Fortinet FortiClientLinux 7.4.0 through 7.4.4, FortiClientLinux 7.2.2 through 7.2.12 may allow a local and unprivileged user to escalate their privileges to root.
Deeper analysisAI
CVE-2026-24018 is a UNIX symbolic link (symlink) following vulnerability, classified under CWE-61, affecting Fortinet FortiClientLinux in versions 7.4.0 through 7.4.4 and 7.2.2 through 7.2.12. Published on 2026-03-10, it carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high impact with low attack complexity and no user interaction required.
A local attacker with unprivileged (low-privilege) access can exploit this vulnerability to escalate privileges to root level. By leveraging symlink traversal, the attacker can manipulate file operations performed by the affected FortiClientLinux components, potentially leading to unauthorized access, modification, or execution with root permissions.
Fortinet has issued advisory FG-IR-26-083, available at https://fortiguard.fortinet.com/psirt/FG-IR-26-083, which provides details on the vulnerability, affected versions, and recommended mitigations or patches for security practitioners to apply.
Details
- CWE(s)