CVE-2025-25252

4.8 MEDIUM

📋 TL;DR

This vulnerability allows attackers with access to SAML session records to re-open terminated sessions, potentially regaining access to FortiOS SSL VPN. Affected systems include FortiOS SSL VPN versions 7.6.0-7.6.2, 7.4.0-7.4.6, 7.2.0-7.2.10, 7.0.0-7.0.16, and all 6.4 versions. This primarily impacts organizations using Fortinet SSL VPN with SAML authentication.

💻 Affected Systems

Products:
  • FortiOS SSL VPN
Versions: 7.6.0 through 7.6.2, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4 all versions
Operating Systems: FortiOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using SAML authentication for SSL VPN. Systems using other authentication methods are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Former administrators or terminated users regain privileged access to VPN sessions, potentially leading to unauthorized network access, data exfiltration, or lateral movement.

🟠

Likely Case

Terminated users with preserved SAML records regain limited access to their previous VPN sessions, potentially accessing internal resources they should no longer have permission to use.

🟢

If Mitigated

With proper session monitoring and access controls, impact is limited to temporary unauthorized access that can be quickly detected and terminated.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires possession of SAML session records from terminated sessions. Attackers need to be former users with preserved session data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiOS 7.6.3, 7.4.7, 7.2.11, 7.0.17, and later versions

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-487

Restart Required: No

Instructions:

1. Download the appropriate FortiOS patch version from Fortinet support portal. 2. Apply the patch through FortiOS web interface or CLI. 3. Verify the update was successful by checking the version number.

🔧 Temporary Workarounds

Disable SAML authentication

all

Temporarily switch to alternative authentication methods until patching is complete

config user saml
edit [saml-server-name]
set status disable
end

Reduce session timeout

all

Decrease SSL VPN session timeout to limit exposure window

config vpn ssl settings
set idle-timeout 300
end

🧯 If You Can't Patch

  • Implement strict session monitoring and alerting for unusual session re-establishment
  • Enforce mandatory session termination procedures when users leave the organization

🔍 How to Verify

Check if Vulnerable:

Check FortiOS version with 'get system status' and verify if using SAML authentication for SSL VPN

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify FortiOS version is 7.6.3, 7.4.7, 7.2.11, 7.0.17 or later with 'get system status'

📡 Detection & Monitoring

Log Indicators:

  • Multiple session re-establishment attempts from same user
  • Session creation after account termination
  • Unusual SAML authentication patterns

Network Indicators:

  • Unexpected VPN connections from terminated users
  • SAML authentication anomalies

SIEM Query:

source="fortigate" AND (event_type="vpn" OR auth_method="saml") AND (user_status="terminated" OR session_reuse="true")

🔗 References

📤 Share & Export