CVE-2025-53744

7.2 HIGH

📋 TL;DR

A privilege escalation vulnerability in FortiOS Security Fabric allows remote authenticated attackers with high privileges to gain super-admin access by registering the device to a malicious FortiManager. This affects FortiOS versions 6.4 through 7.6.2 across multiple release branches. Attackers must already have high-privilege credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • FortiOS Security Fabric
Versions: 7.6.0-7.6.2, 7.4.0-7.4.7, 7.2 all versions, 7.0 all versions, 6.4 all versions
Operating Systems: FortiOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires FortiManager integration feature to be enabled and attacker must have high-privilege credentials.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with existing high privileges gains super-admin access, enabling complete control over the FortiOS device, including configuration changes, traffic interception, and lateral movement to connected systems.

🟠

Likely Case

Malicious insiders or compromised high-privilege accounts escalate to super-admin to maintain persistence, exfiltrate data, or disrupt network operations.

🟢

If Mitigated

With proper access controls and monitoring, exploitation would be detected and contained before significant damage occurs.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires existing high-privilege credentials and ability to register device to malicious FortiManager.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.6.3, 7.4.8, and later versions

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-173

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download appropriate patched version from Fortinet support portal. 3. Upload firmware to FortiOS device. 4. Install update following vendor instructions. 5. Verify successful installation and restore configuration if needed.

🔧 Temporary Workarounds

Restrict FortiManager Registration

all

Limit which FortiManager devices can register with vulnerable FortiOS devices using IP whitelisting and certificate validation.

config system central-management
set type fortimanager
set fmg <trusted-ip>
end

Monitor Administrative Actions

all

Enable detailed logging for all administrative actions, particularly FortiManager registration events.

config log eventfilter
set security-rating enable
set system enable
set endpoint enable
end

🧯 If You Can't Patch

  • Implement strict access controls to limit high-privilege accounts and monitor their activity closely.
  • Disable FortiManager integration if not required for operations, or restrict to trusted management networks only.

🔍 How to Verify

Check if Vulnerable:

Check FortiOS version via web interface or CLI: 'get system status' and compare against affected versions.

Check Version:

get system status | grep Version

Verify Fix Applied:

After patching, verify version is 7.6.3+, 7.4.8+, or later unaffected version using 'get system status' command.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected FortiManager registration events
  • Privilege escalation attempts in admin logs
  • Multiple super-admin account creations

Network Indicators:

  • Unauthorized FortiManager connection attempts
  • Unusual administrative traffic patterns

SIEM Query:

source="fortios" AND (event="FortiManager registration" OR event="privilege escalation")

🔗 References

📤 Share & Export