### [CVE-2024-40586](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40586) ![](https://img.shields.io/static/v1?label=Product&message=FortiClientWindows&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=7.0.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.2.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.4.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Escalation%20of%20privilege&color=brightgreen) ### Description An Improper Access Control vulnerability [CWE-284] in FortiClient Windows version 7.4.0, version 7.2.6 and below, version 7.0.13 and below may allow a local user to escalate his privileges via FortiSSLVPNd service pipe. ### POC #### Reference No PoCs from references. #### Github - https://github.com/Hagrid29/CVE-2024-40586-Windows-Coerced-Authentication-in-FortiClient