An Insecure Temporary File vulnerability in FortiClient for Windows 6.2.1 and below.
The information has been provided by Lasse Trolle Borup
The original article can be found at:https://fortiguard.com/psirt/FG-IR-20-040
Allow a local user to gain elevated privileges via exhausting the pool of temporary file names combined with a symbolic link attack.
FortiClient for Windows 6.2.1