CVE-2025-25256

9.8 CRITICAL

📋 TL;DR

This critical vulnerability allows unauthenticated attackers to execute arbitrary operating system commands on FortiSIEM systems via crafted CLI requests. It affects FortiSIEM versions 6.7.8 and earlier, 7.0.0-7.0.3, 7.1.0-7.1.7, 7.2.0-7.2.5, and 7.3.0-7.3.1. Organizations using these vulnerable versions are at immediate risk of complete system compromise.

💻 Affected Systems

Products:
  • Fortinet FortiSIEM
Versions: Versions before 6.7.9, 7.0.0 through 7.0.3, 7.1.0 through 7.1.7, 7.2.0 through 7.2.5, 7.3.0 through 7.3.1
Operating Systems: FortiSIEM appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data exfiltration, ransomware deployment, lateral movement across the network, and persistent backdoor installation.

🟠

Likely Case

Unauthenticated remote code execution allowing attackers to gain shell access, install malware, and pivot to other systems in the network.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts from reaching vulnerable systems.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation allows attackers to compromise systems directly from the internet without any credentials.
🏢 Internal Only: HIGH - Even internally, unauthenticated access means any compromised internal system or malicious insider can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public proof-of-concept exploits exist, including from watchTowr Labs. Exploitation requires no authentication and minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.7.9, 7.0.4, 7.1.8, 7.2.6, 7.3.2

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-152

Restart Required: Yes

Instructions:

1. Download the appropriate patch version from Fortinet support portal. 2. Backup current configuration. 3. Apply the patch following Fortinet's upgrade guide. 4. Restart the FortiSIEM system. 5. Verify the patch was applied successfully.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to FortiSIEM management interfaces to only trusted IP addresses

Disable Unnecessary Services

all

Disable any unnecessary CLI or management services that are not required for operations

🧯 If You Can't Patch

  • Immediately isolate FortiSIEM systems from internet access and restrict internal network access
  • Implement strict network segmentation and monitor all traffic to/from FortiSIEM systems for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check FortiSIEM version via web interface or CLI command 'show version' and compare against affected versions

Check Version:

show version

Verify Fix Applied:

Verify version is updated to 6.7.9 or higher, 7.0.4 or higher, 7.1.8 or higher, 7.2.6 or higher, or 7.3.2 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI command execution patterns
  • Failed authentication attempts followed by successful command execution
  • Suspicious process creation from FortiSIEM services

Network Indicators:

  • Unusual outbound connections from FortiSIEM systems
  • Traffic to known malicious IPs from FortiSIEM
  • Unexpected port scanning originating from FortiSIEM

SIEM Query:

source="fortisiem" AND (event_type="command_execution" OR process_name="bash" OR process_name="sh") AND user="unauthenticated"

🔗 References

📤 Share & Export