CVE-2025-53951

5.3 MEDIUM

📋 TL;DR

This path traversal vulnerability in Fortinet FortiDLP Agent's Outlookproxy plugin allows authenticated attackers to escalate privileges to LocalService by sending crafted requests to a local listening port. Affected users include those running vulnerable versions of FortiDLP Agent on Windows systems with the Outlookproxy plugin enabled.

💻 Affected Systems

Products:
  • Fortinet FortiDLP Agent
Versions: Windows versions: 11.5.1, 11.4.2-11.4.6, 11.3.2-11.3.4, 11.2.0-11.2.3, 11.1.1-11.1.2, 11.0.1, 10.5.1, 10.4.0, 10.3.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Outlookproxy plugin to be enabled and running on the FortiDLP Agent.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains LocalService privileges, potentially allowing them to access sensitive system resources, modify configurations, or perform further privilege escalation.

🟠

Likely Case

An authenticated user with local access escalates to LocalService to bypass security controls or access protected files.

🟢

If Mitigated

With proper network segmentation and least privilege principles, impact is limited to the local system with minimal lateral movement potential.

🌐 Internet-Facing: LOW - This requires local authenticated access to the Windows system, not directly exploitable from the internet.
🏢 Internal Only: MEDIUM - Requires authenticated access to vulnerable Windows endpoints, making it relevant for insider threats or compromised internal accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to the Windows system and knowledge of the local listening port used by the Outlookproxy plugin.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Fortinet advisory for specific patched versions per release train

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-628

Restart Required: No

Instructions:

1. Review Fortinet advisory FG-IR-25-628. 2. Identify affected FortiDLP Agent versions in your environment. 3. Upgrade to patched versions as specified in the advisory. 4. Verify the Outlookproxy plugin is updated.

🔧 Temporary Workarounds

Disable Outlookproxy Plugin

Windows

Temporarily disable the vulnerable Outlookproxy plugin if immediate patching isn't possible

Consult FortiDLP Agent documentation for plugin management commands

Restrict Local Port Access

Windows

Use Windows Firewall to restrict access to the local listening port used by Outlookproxy

netsh advfirewall firewall add rule name="Block FortiDLP Outlookproxy" dir=in action=block protocol=TCP localport=[PORT_NUMBER]

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems
  • Apply principle of least privilege to limit authenticated user access to vulnerable endpoints

🔍 How to Verify

Check if Vulnerable:

Check FortiDLP Agent version and verify if Outlookproxy plugin is enabled on affected Windows versions

Check Version:

Check FortiDLP Agent GUI or consult Fortinet documentation for version checking commands

Verify Fix Applied:

Verify FortiDLP Agent has been updated to a patched version and confirm Outlookproxy plugin version

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation by LocalService account
  • Suspicious network connections to local Outlookproxy port
  • Failed privilege escalation attempts in Windows security logs

Network Indicators:

  • Unexpected traffic to the local Outlookproxy port from non-standard processes
  • Multiple rapid connections to the local service port

SIEM Query:

Example: (process_name:"outlookproxy.exe" AND event_type:"process_creation") OR (destination_port:[OUTLOOKPROXY_PORT] AND source_ip:local_subnet)

🔗 References

📤 Share & Export