CVE-2025-46775

5.5 MEDIUM

📋 TL;DR

A debug information disclosure vulnerability in Fortinet FortiExtender allows authenticated users to obtain administrator credentials through debug log commands. This affects FortiExtender versions 7.0, 7.2, 7.4.0-7.4.6, and 7.6.0-7.6.1. Attackers with authenticated access can escalate privileges to administrative control.

💻 Affected Systems

Products:
  • Fortinet FortiExtender
Versions: 7.0 all versions, 7.2 all versions, 7.4.0 through 7.4.6, 7.6.0 through 7.6.1
Operating Systems: FortiOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; debug logging features expose credentials when accessed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise where attackers obtain administrative credentials, gain complete control over FortiExtender devices, and potentially pivot to connected networks.

🟠

Likely Case

Privilege escalation from authenticated user to administrator, allowing configuration changes, data interception, and further network access.

🟢

If Mitigated

Limited impact with proper access controls, network segmentation, and monitoring preventing credential misuse.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access; debug commands are straightforward to execute once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiExtender 7.6.2 and later, 7.4.7 and later

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-259

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download latest firmware from Fortinet support portal. 3. Upload firmware to FortiExtender via web GUI or CLI. 4. Install update and reboot device. 5. Verify version after reboot.

🔧 Temporary Workarounds

Disable debug logging

all

Disable debug logging features to prevent credential exposure through debug commands.

config system global
set debug disable
end

Restrict user access

all

Limit authenticated user access to only necessary personnel and implement least privilege principles.

🧯 If You Can't Patch

  • Implement strict access controls and network segmentation to limit authenticated user access to FortiExtender devices.
  • Enable comprehensive logging and monitoring for suspicious debug command usage and credential access attempts.

🔍 How to Verify

Check if Vulnerable:

Check FortiExtender firmware version via web GUI (System > Dashboard) or CLI command 'get system status'.

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify firmware version is 7.6.2+ or 7.4.7+ after patching and test debug commands no longer reveal credentials.

📡 Detection & Monitoring

Log Indicators:

  • Debug log access attempts
  • Unauthorized credential retrieval events
  • User privilege escalation logs

Network Indicators:

  • Unusual authentication patterns to FortiExtender management interfaces
  • Suspicious debug command traffic

SIEM Query:

source="fortiextender" AND (event="debug" OR event="credential" OR event="privilege")

🔗 References

📤 Share & Export