CVE-2025-25256
📋 TL;DR
This critical vulnerability allows unauthenticated attackers to execute arbitrary operating system commands on FortiSIEM systems via crafted CLI requests. It affects FortiSIEM versions 6.7.8 and earlier, 7.0.0-7.0.3, 7.1.0-7.1.7, 7.2.0-7.2.5, and 7.3.0-7.3.1. Organizations using these vulnerable versions are at immediate risk of complete system compromise.
💻 Affected Systems
- Fortinet FortiSIEM
📦 What is this software?
Fortisiem by Fortinet
Fortisiem by Fortinet
Fortisiem by Fortinet
Fortisiem by Fortinet
Fortisiem by Fortinet
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise leading to data exfiltration, ransomware deployment, lateral movement across the network, and persistent backdoor installation.
Likely Case
Unauthenticated remote code execution allowing attackers to gain shell access, install malware, and pivot to other systems in the network.
If Mitigated
Limited impact if proper network segmentation and access controls prevent exploitation attempts from reaching vulnerable systems.
🎯 Exploit Status
Multiple public proof-of-concept exploits exist, including from watchTowr Labs. Exploitation requires no authentication and minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.7.9, 7.0.4, 7.1.8, 7.2.6, 7.3.2
Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-152
Restart Required: Yes
Instructions:
1. Download the appropriate patch version from Fortinet support portal. 2. Backup current configuration. 3. Apply the patch following Fortinet's upgrade guide. 4. Restart the FortiSIEM system. 5. Verify the patch was applied successfully.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to FortiSIEM management interfaces to only trusted IP addresses
Disable Unnecessary Services
allDisable any unnecessary CLI or management services that are not required for operations
🧯 If You Can't Patch
- Immediately isolate FortiSIEM systems from internet access and restrict internal network access
- Implement strict network segmentation and monitor all traffic to/from FortiSIEM systems for suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check FortiSIEM version via web interface or CLI command 'show version' and compare against affected versions
Check Version:
show version
Verify Fix Applied:
Verify version is updated to 6.7.9 or higher, 7.0.4 or higher, 7.1.8 or higher, 7.2.6 or higher, or 7.3.2 or higher
📡 Detection & Monitoring
Log Indicators:
- Unusual CLI command execution patterns
- Failed authentication attempts followed by successful command execution
- Suspicious process creation from FortiSIEM services
Network Indicators:
- Unusual outbound connections from FortiSIEM systems
- Traffic to known malicious IPs from FortiSIEM
- Unexpected port scanning originating from FortiSIEM
SIEM Query:
source="fortisiem" AND (event_type="command_execution" OR process_name="bash" OR process_name="sh") AND user="unauthenticated"
🔗 References
- https://fortiguard.fortinet.com/psirt/FG-IR-25-152
- https://www.theregister.com/2025/08/13/fortinet_discloses_critical_bug/
- https://github.com/watchtowrlabs/watchTowr-vs-FortiSIEM-CVE-2025-25256
- https://labs.watchtowr.com/should-security-solutions-be-secure-maybe-were-all-wrong-fortinet-fortisiem-pre-auth-command-injection-cve-2025-25256/