First published: Mon Mar 17 2025(Updated: )
FortiOS 6.2 running AV engine version 6.00142 and below, FortiOS 6.4 running AV engine version 6.00144 and below and FortiClient 6.2 running AV engine version 6.00137 and below may not immediately detect certain types of malformed or non-standard RAR archives, potentially containing malicious files. Based on the samples provided, FortiClient will detect the malicious files upon trying extraction by real-time scanning and FortiGate will detect the malicious archive if Virus Outbreak Prevention is enabled.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | >=6.2<6.00142>=6.4<6.00144 | |
Fortinet FortiClient Virtual Private Network | >=6.2<6.00137 |
FortiOS 6.2 running AV engine version 6.00145 or later. FortiOS 6.4 running AV engine version 6.00145 or later. FortiClient 6.2 running AV engine version 6.00145 or later. FortiClient 6.4 running AV engine version 6.00243 or later. Workaround for FortiGate: Enable Virus Outbreak Prevention feature.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-9295 has been marked as a medium severity vulnerability due to its potential to allow the execution of malicious files through malformed RAR archives.
To mitigate CVE-2020-9295, users should update FortiOS and FortiClient to the latest versions that include patches for the vulnerability.
CVE-2020-9295 affects FortiOS versions 6.2 below 6.00142, versions 6.4 below 6.00144, and FortiClient version 6.2 below 6.00137.
CVE-2020-9295 may allow the execution of malicious files contained in certain malformed or non-standard RAR archives.
Yes, immediate action is advisable for CVE-2020-9295 to prevent potential exploitation through unpatched vulnerabilities.