Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
forticlient Vendor: fortinet

About This Product

forticlient is a software product offered by fortinet. As a client-side component, this product is widely deployed across endpoints, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 86 known vulnerabilities affecting fortinet forticlient. This includes 2 critical-severity issues and 49 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2005 to 2026, indicating a sustained research interest and ongoing security attention. 28 medium-severity issues and 7 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2005-4570 2005-12-29 2025-04-03 - 7.8 Likely
CVE-2009-1262 2009-04-07 2025-04-09 - 7.2 Unknown
CVE-2013-4669 2013-06-25 2025-04-11 - 5.4 Unknown
CVE-2015-1453 2015-02-02 2025-04-12 - 5.0 Likely
CVE-2015-1569 2015-02-10 2025-04-12 - 4.3 Likely
CVE-2015-1570 2015-02-10 2025-04-12 - 4.3 Likely
CVE-2015-4077 2015-09-03 2025-04-12 - 2.1 Unknown
CVE-2015-5735 2015-09-03 2025-04-12 - 7.2 Unknown
CVE-2015-5736 2015-09-03 2025-04-12 - 7.2 Unknown
CVE-2015-5737 2015-09-03 2025-04-12 - 7.2 Unknown
CVE-2015-7362 2016-01-08 2025-04-12 7.8 7.2 Unknown
CVE-2016-8493 2017-06-26 2025-04-20 8.8 9.0 Likely
CVE-2017-7344 2017-12-14 2025-04-20 8.1 7.6 Unknown
CVE-2017-14184 2017-12-15 2025-04-20 8.8 4.0 Likely
CVE-2017-17543 2018-04-26 2024-11-21 7.5 5.0 Likely
CVE-2018-9190 2019-02-08 2024-11-21 5.5 4.9 Unknown
CVE-2019-5589 2019-05-28 2024-11-21 7.8 9.3 Likely
CVE-2018-13368 2019-05-30 2024-11-21 7.8 4.6 Unknown
CVE-2018-9191 2019-05-30 2024-11-21 7.8 4.6 Unknown
CVE-2018-9193 2019-05-30 2025-03-24 7.8 4.6 Unknown
CVE-2019-6692 2019-10-24 2024-11-21 7.8 4.4 Unknown
CVE-2018-9195 2019-11-21 2024-11-21 5.9 4.3 Likely
CVE-2019-15704 2019-11-21 2024-11-21 5.5 2.1 Unknown
CVE-2019-17650 2019-11-21 2024-11-21 7.8 7.2 Unknown
CVE-2019-15711 2020-02-06 2024-11-21 7.8 7.2 Unknown
CVE-2019-16152 2020-02-06 2024-11-21 6.5 6.8 Likely
CVE-2019-17652 2020-02-06 2024-11-21 6.5 6.8 Likely
CVE-2019-16155 2020-02-07 2024-11-21 7.1 6.6 Unknown
CVE-2019-17658 2020-03-12 2024-11-21 9.8 7.5 Likely
CVE-2020-9290 2020-03-15 2024-11-21 7.8 6.9 Unknown
CVE-2020-9291 2020-06-01 2024-11-21 6.3 4.6 Unknown
CVE-2019-16150 2020-06-04 2024-11-21 5.5 5.0 Likely
CVE-2021-26089 2021-07-12 2024-11-21 6.7 7.2 Unknown
CVE-2021-36183 2021-11-02 2024-11-21 7.4 7.2 Unknown
CVE-2021-42754 2021-11-02 2024-11-21 3.2 3.5 Unknown
CVE-2021-32592 2021-12-01 2024-11-21 7.8 6.9 Unknown
CVE-2021-43204 2021-12-09 2024-11-21 4.4 4.9 Unknown
CVE-2021-36167 2021-12-09 2024-11-21 4.3 5.0 Likely
CVE-2021-41028 2021-12-16 2024-11-21 8.2 5.4 Unknown
CVE-2021-43205 2022-04-06 2024-11-21 4.3 5.0 Likely
CVE-2021-44169 2022-04-06 2024-11-21 8.2 4.6 Unknown
CVE-2021-22127 2022-04-06 2024-11-21 7.1 7.9 Unknown
CVE-2021-44167 2022-05-11 2024-11-21 6.8 5.0 Likely
CVE-2021-43066 2022-05-11 2024-11-21 8.4 4.6 Unknown
CVE-2021-41031 2022-07-18 2024-11-21 7.8 - -
CVE-2022-26113 2022-07-19 2024-11-21 7.7 - -
CVE-2022-33878 2022-11-02 2024-11-21 2.2 - -
CVE-2022-40682 2023-04-11 2024-11-21 7.8 - -
CVE-2022-42470 2023-04-11 2024-11-21 7.8 - -
CVE-2022-43946 2023-04-11 2024-11-21 7.5 - -
CVE-2023-22635 2023-04-11 2024-11-21 7.3 - -
CVE-2022-33877 2023-06-13 2024-11-21 7.0 - -
CVE-2023-37939 2023-10-10 2024-11-21 3.3 - -
CVE-2023-33304 2023-11-14 2024-11-21 4.4 - -
CVE-2023-41840 2023-11-14 2024-11-21 7.8 - -
CVE-2022-40681 2023-11-14 2024-11-21 7.1 - -
CVE-2023-45590 2024-04-09 2025-01-17 9.6 - -
CVE-2024-31492 2024-04-10 2025-01-23 8.2 - -
CVE-2024-3661 2024-05-06 2025-01-15 7.6 - -
CVE-2022-45856 2024-09-10 2024-09-26 4.8 - -
CVE-2024-31489 2024-09-10 2024-09-20 6.8 - -
CVE-2024-35282 2024-09-10 2024-09-20 4.2 - -
CVE-2024-36507 2024-11-12 2024-11-14 7.3 - -
CVE-2024-36513 2024-11-12 2024-11-14 8.2 - -
CVE-2024-40592 2024-11-12 2024-11-14 7.5 - -
CVE-2024-47574 2024-11-13 2025-01-21 7.8 - -
CVE-2024-50570 2024-12-18 2025-07-24 5.0 - -
CVE-2020-15934 2024-12-19 2025-01-21 8.8 - -
CVE-2024-50564 2025-01-14 2025-06-11 3.3 - -
CVE-2024-40586 2025-02-11 2025-07-16 6.7 - -
CVE-2024-52968 2025-02-11 2025-07-16 6.7 - -
CVE-2023-45588 2025-03-14 2025-07-15 8.2 - -
CVE-2020-9295 2025-03-17 2025-08-14 4.7 - -
CVE-2024-35281 2025-05-13 2026-02-05 2.5 - -
CVE-2025-24473 2025-05-28 2026-01-08 3.7 - -
CVE-2025-25251 2025-05-28 2025-06-04 7.8 - -
CVE-2024-54019 2025-06-10 2025-07-25 4.8 - -
CVE-2025-31365 2025-10-14 2025-10-15 5.8 - -
CVE-2025-46774 2025-10-14 2025-10-22 7.5 - -
CVE-2025-57716 2025-10-14 2025-10-15 6.7 - -
CVE-2025-57741 2025-10-14 2025-10-15 7.8 - -
CVE-2025-46373 2025-11-18 2025-12-16 7.8 - -
CVE-2025-47761 2025-11-18 2025-12-16 7.8 - -
CVE-2025-54660 2025-11-18 2025-11-20 5.5 - -
CVE-2025-62676 2026-02-10 2026-02-12 7.1 - -
CVE-2026-24018 2026-03-10 2026-03-13 7.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for fortinet forticlient by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.