CVE-2020-9295
FortiClient vulnerability analysis and mitigation

Overview

CVE-2020-9295 is a security vulnerability affecting FortiOS and FortiClient antivirus engines that was disclosed on December 1, 2020. The vulnerability allows antivirus evasion through malformed RAR files, where the AV engines may not immediately detect certain types of malformed or non-standard RAR archives that potentially contain malicious files. The affected products include FortiOS 6.2 running AV engine version 6.00142 and below, FortiOS 6.4 running AV engine version 6.00144 and below, and FortiClient 6.2 running AV engine version 6.00137 and below (Fortiguard PSIRT).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 4.7 (Medium severity) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N. The vulnerability is classified under CWE-358 (Improperly Implemented Security Check for Standard). While the AV engines may not detect malicious files immediately in malformed RAR archives, FortiClient will detect the malicious files upon extraction through real-time scanning (Fortiguard PSIRT, NVD).

Impact

The primary impact of this vulnerability is a potential denial of service and the possibility of malicious files evading initial detection. However, FortiClient will detect the malicious files upon trying extraction through real-time scanning, and FortiGate will detect the malicious archive if Virus Outbreak Prevention is enabled (Fortiguard PSIRT).

Mitigation and workarounds

Several solutions have been provided to address this vulnerability: upgrade to FortiOS 6.2 running AV engine version 6.00145 or later, FortiOS 6.4 running AV engine version 6.00145 or later, FortiClient 6.2 running AV engine version 6.00145 or later, or FortiClient 6.4 running AV engine version 6.00243 or later. As a workaround for FortiGate, users can enable the Virus Outbreak Prevention feature (Fortiguard PSIRT).

Community reactions

The vulnerability was responsibly disclosed by security researcher Thierry Zoller, and Fortinet acknowledged their contribution in the security advisory (Fortiguard PSIRT).

Additional resources


SourceThis report was generated using AI

Related FortiClient vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-47761HIGH7.8
  • FortiClientFortiClient
  • cpe:2.3:a:fortinet:forticlient
NoYesNov 18, 2025
CVE-2025-46373HIGH7.8
  • FortiClientFortiClient
  • cpe:2.3:a:fortinet:forticlient
NoYesNov 18, 2025
CVE-2025-57741HIGH7.8
  • FortiClientFortiClient
  • cpe:2.3:a:fortinet:forticlient
NoYesOct 14, 2025
CVE-2025-57716HIGH7.3
  • FortiClientFortiClient
  • cpe:2.3:a:fortinet:forticlient
NoYesOct 14, 2025
CVE-2025-54660MEDIUM5.5
  • FortiClientFortiClient
  • cpe:2.3:a:fortinet:forticlient
NoYesNov 18, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management