CVE-2025-53950

5.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated administrators of Fortinet FortiDLP Agent's Outlookproxy plugin to collect email information from the current user, potentially exposing private personal information. It affects multiple versions of FortiDLP Agent on both macOS and Windows systems.

💻 Affected Systems

Products:
  • Fortinet FortiDLP Agent Outlookproxy plugin
Versions: Windows: 11.5.1, 11.4.2-11.4.6, 11.3.2-11.3.4, 11.2.0-11.2.3, 11.1.1-11.1.2, 11.0.1, 10.5.1, 10.4.0, 10.3.1; macOS: same version ranges
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both macOS and Windows versions. Requires authenticated administrator access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious administrator could systematically collect sensitive email content, attachments, and metadata from all users on affected systems, leading to data breaches, privacy violations, and regulatory compliance failures.

🟠

Likely Case

An administrator with legitimate access could inadvertently or intentionally view email content they shouldn't have access to, violating user privacy and potentially exposing confidential information.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to authorized administrators who are already trusted with system access, though privacy violations could still occur.

🌐 Internet-Facing: LOW - This vulnerability requires authenticated administrator access and is not directly exploitable from the internet.
🏢 Internal Only: MEDIUM - The risk exists within the organization where administrators have access to affected systems, potentially allowing insider threats or accidental privacy violations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires authenticated administrator access but no special technical skills beyond that.

Exploitation requires administrator privileges on the affected system. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Fortinet advisory for specific patched versions

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-639

Restart Required: No

Instructions:

1. Review Fortinet advisory FG-IR-25-639. 2. Identify affected FortiDLP Agent versions in your environment. 3. Upgrade to patched versions as specified by Fortinet. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit the number of users with administrator privileges on systems running FortiDLP Agent to reduce attack surface.

Monitor Administrator Activity

all

Implement logging and monitoring of administrator actions on systems with FortiDLP Agent to detect potential misuse.

🧯 If You Can't Patch

  • Implement strict access controls and least privilege principles for administrator accounts
  • Enable detailed logging and monitoring of administrator activities on affected systems

🔍 How to Verify

Check if Vulnerable:

Check FortiDLP Agent version via FortiClient interface or system information. Compare against affected versions listed in the advisory.

Check Version:

On Windows: Check FortiClient interface or Program Files\Fortinet\FortiClient. On macOS: Check Applications or system information.

Verify Fix Applied:

Verify FortiDLP Agent version has been updated to a version not listed in the affected versions. Check Fortinet advisory for specific patched versions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrator access to FortiDLP Agent components
  • Multiple email access attempts by administrators
  • Changes to FortiDLP Agent configuration

Network Indicators:

  • Unusual outbound data transfers from systems with FortiDLP Agent

SIEM Query:

source="fortidlp" AND (event_type="admin_access" OR event_type="email_access") AND user_role="administrator"

🔗 References

📤 Share & Export