CVE-2025-22252
📋 TL;DR
This vulnerability allows attackers who know an existing admin account name to bypass authentication and gain full administrative access to affected Fortinet devices. It affects FortiProxy, FortiSwitchManager, and FortiOS systems running specific vulnerable versions. Attackers can compromise the entire device without needing the admin password.
💻 Affected Systems
- FortiProxy
- FortiSwitchManager
- FortiOS
📦 What is this software?
Fortios by Fortinet
Fortios by Fortinet
Fortiproxy by Fortinet
⚠️ Risk & Real-World Impact
Worst Case
Complete device takeover leading to network compromise, data exfiltration, lateral movement, and persistent backdoor installation.
Likely Case
Unauthorized administrative access allowing configuration changes, user account manipulation, and potential credential harvesting.
If Mitigated
Limited impact if devices are isolated, have strict network controls, and admin account names are not known to attackers.
🎯 Exploit Status
Attack requires knowledge of admin account name but no password. Simple HTTP request manipulation likely sufficient.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: FortiProxy 7.6.2+, FortiSwitchManager 7.2.6+, FortiOS 7.4.7+ and 7.6.1+
Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-472
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Download appropriate firmware from Fortinet support portal. 3. Upload firmware to device via GUI or CLI. 4. Install update. 5. Reboot device. 6. Verify version after reboot.
🔧 Temporary Workarounds
Restrict Management Access
allLimit management interface access to trusted IP addresses only
config system interface
edit <interface_name>
set allowaccess https ssh ping
set trust-ip-1 <trusted_ip>
end
Change Admin Account Names
allRename default admin accounts to obscure names
config system admin
edit admin
set accprofile super_admin
set wildcard enable
rename <new_obscure_name>
end
🧯 If You Can't Patch
- Isolate affected devices from internet and untrusted networks
- Implement strict network segmentation and monitor for unauthorized access attempts
🔍 How to Verify
Check if Vulnerable:
Check device version via GUI (System > Dashboard) or CLI (get system status). Compare against affected versions.
Check Version:
get system status | grep Version
Verify Fix Applied:
Verify version is updated to patched version. Test authentication with known admin account name - should require password.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed authentication attempts followed by successful login from same IP
- Admin login from unusual IP addresses
- Configuration changes from unexpected sources
Network Indicators:
- HTTP requests to management interface with authentication bypass patterns
- Unusual administrative traffic patterns
SIEM Query:
source="fortigate" AND (eventtype="login" OR eventtype="admin") AND result="success" | stats count by src_ip user