CVE-2025-54658

7.8 HIGH

📋 TL;DR

This path traversal vulnerability in Fortinet FortiDLP Agent's Outlookproxy plugin allows authenticated attackers on affected MacOS systems to escalate privileges to root by sending crafted requests to a local listening port. It affects multiple versions of FortiDLP Agent across various FortiOS releases. Attackers must already have local authenticated access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Fortinet FortiDLP Agent Outlookproxy plugin
Versions: FortiDLP Agent versions: 11.5.1, 11.4.2-11.4.6, 11.3.2-11.3.4, 11.2.0-11.2.3, 11.1.1-11.1.2, 11.0.1, 10.5.1, 10.4.0, 10.3.1
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects MacOS installations with the FortiDLP Agent Outlookproxy plugin enabled. Requires local authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root-level access, enabling installation of persistent malware, data exfiltration, and lateral movement across the network.

🟠

Likely Case

Privilege escalation from a standard user account to root, allowing attackers to bypass security controls, access sensitive files, and maintain persistence.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege principles are enforced, though local privilege escalation remains possible.

🌐 Internet-Facing: LOW - Exploitation requires local authenticated access; not directly exploitable from the internet.
🏢 Internal Only: HIGH - Any authenticated user on affected MacOS systems can potentially exploit this to gain root privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Once authenticated, exploitation involves sending crafted requests to a local port.

Exploitation requires authenticated access to the local system. The vulnerability is in the Outlookproxy plugin component.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Fortinet advisory FG-IR-25-628 for specific patched versions

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-628

Restart Required: Yes

Instructions:

1. Review Fortinet advisory FG-IR-25-628. 2. Upgrade FortiDLP Agent to patched version. 3. Restart affected systems. 4. Verify patch installation.

🔧 Temporary Workarounds

Disable Outlookproxy plugin

macos

Temporarily disable the vulnerable Outlookproxy plugin component

Consult Fortinet documentation for plugin disable procedures

Restrict local port access

macos

Implement firewall rules to restrict access to the local listening port used by Outlookproxy

sudo pfctl -e
Add appropriate pf rules to restrict localhost:port access

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems
  • Enforce least privilege principles and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check FortiDLP Agent version and compare against affected versions list. Verify Outlookproxy plugin is enabled.

Check Version:

Check FortiDLP Agent version through FortiManager or local agent interface

Verify Fix Applied:

Confirm FortiDLP Agent version is updated to patched version per Fortinet advisory. Verify no privilege escalation attempts succeed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation with root privileges
  • Access to restricted directories by non-root users
  • Failed privilege escalation attempts

Network Indicators:

  • Unusual traffic to local listening ports
  • Multiple connection attempts to Outlookproxy service

SIEM Query:

Process creation where parent_process contains 'outlookproxy' and user changes from non-root to root

🔗 References

📤 Share & Export