CVE-2025-22252

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers who know an existing admin account name to bypass authentication and gain full administrative access to affected Fortinet devices. It affects FortiProxy, FortiSwitchManager, and FortiOS systems running specific vulnerable versions. Attackers can compromise the entire device without needing the admin password.

💻 Affected Systems

Products:
  • FortiProxy
  • FortiSwitchManager
  • FortiOS
Versions: FortiProxy 7.6.0-7.6.1, FortiSwitchManager 7.2.5, FortiOS 7.4.4-7.4.6 and 7.6.0
Default Config Vulnerable: ⚠️ Yes
Notes: Requires knowledge of an existing admin account name. All configurations with vulnerable versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to network compromise, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Unauthorized administrative access allowing configuration changes, user account manipulation, and potential credential harvesting.

🟢

If Mitigated

Limited impact if devices are isolated, have strict network controls, and admin account names are not known to attackers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Attack requires knowledge of admin account name but no password. Simple HTTP request manipulation likely sufficient.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiProxy 7.6.2+, FortiSwitchManager 7.2.6+, FortiOS 7.4.7+ and 7.6.1+

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-472

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download appropriate firmware from Fortinet support portal. 3. Upload firmware to device via GUI or CLI. 4. Install update. 5. Reboot device. 6. Verify version after reboot.

🔧 Temporary Workarounds

Restrict Management Access

all

Limit management interface access to trusted IP addresses only

config system interface
edit <interface_name>
set allowaccess https ssh ping
set trust-ip-1 <trusted_ip>
end

Change Admin Account Names

all

Rename default admin accounts to obscure names

config system admin
edit admin
set accprofile super_admin
set wildcard enable
rename <new_obscure_name>
end

🧯 If You Can't Patch

  • Isolate affected devices from internet and untrusted networks
  • Implement strict network segmentation and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check device version via GUI (System > Dashboard) or CLI (get system status). Compare against affected versions.

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify version is updated to patched version. Test authentication with known admin account name - should require password.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful login from same IP
  • Admin login from unusual IP addresses
  • Configuration changes from unexpected sources

Network Indicators:

  • HTTP requests to management interface with authentication bypass patterns
  • Unusual administrative traffic patterns

SIEM Query:

source="fortigate" AND (eventtype="login" OR eventtype="admin") AND result="success" | stats count by src_ip user

🔗 References

📤 Share & Export