CWE
358
Advisory Published
Updated

CVE-2020-9295

First published: Mon Mar 17 2025(Updated: )

FortiOS 6.2 running AV engine version 6.00142 and below, FortiOS 6.4 running AV engine version 6.00144 and below and FortiClient 6.2 running AV engine version 6.00137 and below may not immediately detect certain types of malformed or non-standard RAR archives, potentially containing malicious files. Based on the samples provided, FortiClient will detect the malicious files upon trying extraction by real-time scanning and FortiGate will detect the malicious archive if Virus Outbreak Prevention is enabled.

Credit: psirt@fortinet.com

Affected SoftwareAffected VersionHow to fix
FortiOS>=6.2<6.00142>=6.4<6.00144
Fortinet FortiClient Virtual Private Network>=6.2<6.00137

Remedy

FortiOS 6.2 running AV engine version 6.00145 or later. FortiOS 6.4 running AV engine version 6.00145 or later. FortiClient 6.2 running AV engine version 6.00145 or later. FortiClient 6.4 running AV engine version 6.00243 or later. Workaround for FortiGate: Enable Virus Outbreak Prevention feature.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2020-9295?

    CVE-2020-9295 has been marked as a medium severity vulnerability due to its potential to allow the execution of malicious files through malformed RAR archives.

  • How do I fix CVE-2020-9295?

    To mitigate CVE-2020-9295, users should update FortiOS and FortiClient to the latest versions that include patches for the vulnerability.

  • What products are affected by CVE-2020-9295?

    CVE-2020-9295 affects FortiOS versions 6.2 below 6.00142, versions 6.4 below 6.00144, and FortiClient version 6.2 below 6.00137.

  • What types of files does CVE-2020-9295 potentially allow through?

    CVE-2020-9295 may allow the execution of malicious files contained in certain malformed or non-standard RAR archives.

  • Is immediate action required for CVE-2020-9295?

    Yes, immediate action is advisable for CVE-2020-9295 to prevent potential exploitation through unpatched vulnerabilities.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203