CVE-2025-54659

5.8 MEDIUM

📋 TL;DR

This path traversal vulnerability in Fortinet FortiSOAR Agent Communication Bridge allows unauthenticated attackers to read files accessible to the fortisoar user on systems where the agent is deployed. Attackers can exploit this by sending crafted requests to the agent port, potentially exposing sensitive system files. Organizations using FortiSOAR Agent Communication Bridge versions 1.0 or 1.1.0 are affected.

💻 Affected Systems

Products:
  • Fortinet FortiSOAR Agent Communication Bridge
Versions: 1.0 all versions, 1.1.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where the FortiSOAR Agent Communication Bridge is deployed and accessible via network.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the fortisoar user's accessible files, including sensitive configuration files, credentials, or other critical system data that could lead to further system compromise.

🟠

Likely Case

Unauthorized reading of configuration files, logs, or other sensitive data accessible to the fortisoar service account, potentially exposing credentials or system information.

🟢

If Mitigated

Limited exposure of non-critical files if proper file permissions and network segmentation are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the agent port and knowledge of file paths, but no authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Fortinet advisory for specific patched versions

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-26-084

Restart Required: Yes

Instructions:

1. Review Fortinet advisory FG-IR-26-084. 2. Upgrade to patched version as specified by Fortinet. 3. Restart affected services. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to FortiSOAR Agent Communication Bridge ports to only trusted sources.

# Use firewall rules to restrict access
# Example: iptables -A INPUT -p tcp --dport <agent_port> -s <trusted_ip> -j ACCEPT
# iptables -A INPUT -p tcp --dport <agent_port> -j DROP

File Permission Hardening

linux

Restrict file permissions for files accessible to the fortisoar user to minimize potential data exposure.

# Review and tighten permissions on sensitive files
# chmod 600 /path/to/sensitive/file
# chown root:root /path/to/sensitive/file

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FortiSOAR Agent Communication Bridge from untrusted networks.
  • Monitor for unusual file access patterns and implement file integrity monitoring on critical files.

🔍 How to Verify

Check if Vulnerable:

Check if running FortiSOAR Agent Communication Bridge version 1.0 or 1.1.0 and if the agent port is accessible from untrusted networks.

Check Version:

# Check FortiSOAR version via management interface or configuration files

Verify Fix Applied:

Verify the version has been updated to a patched release and test that path traversal attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in FortiSOAR logs
  • Multiple failed or unusual requests to agent port
  • Access to files outside expected directories

Network Indicators:

  • Unusual traffic patterns to FortiSOAR agent port from untrusted sources
  • Requests with path traversal patterns (../, ..\)

SIEM Query:

source="fortisoar" AND (url="*../*" OR url="*..\\*")

🔗 References

📤 Share & Export