CVE-2025-54821

1.9 LOW

📋 TL;DR

This CVE describes an improper privilege management vulnerability in multiple Fortinet products that allows authenticated administrators to bypass trusted host policies via crafted CLI commands. The vulnerability affects FortiOS, FortiPAM, and FortiProxy across multiple versions. Exploitation requires administrative access and has limited impact due to the low CVSS score.

💻 Affected Systems

Products:
  • FortiOS
  • FortiPAM
  • FortiProxy
Versions: FortiOS 7.6.0-7.6.3, 7.4 all, 7.2 all, 7.0 all, 6.4 all; FortiPAM 1.6.0, 1.5 all, 1.4 all, 1.3 all, 1.2 all, 1.1 all, 1.0 all; FortiProxy 7.6.0-7.6.3, 7.4 all, 7.2 all, 7.0 all
Operating Systems: FortiOS (custom OS)
Default Config Vulnerable: ⚠️ Yes
Notes: All affected versions are vulnerable in default configurations. Requires administrative access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious administrator could bypass trusted host restrictions to access systems from unauthorized IP addresses, potentially enabling lateral movement or data exfiltration.

🟠

Likely Case

Limited impact since exploitation requires administrative credentials; most likely used by authorized administrators to circumvent policy restrictions for convenience.

🟢

If Mitigated

Minimal impact if proper access controls, network segmentation, and administrative monitoring are in place.

🌐 Internet-Facing: LOW - Exploitation requires administrative credentials and CLI access, which should not be exposed to the internet.
🏢 Internal Only: MEDIUM - Internal administrators could bypass security policies, but requires authenticated access and specific knowledge.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated administrative access and knowledge of specific CLI commands. No public exploits available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiOS 7.6.4, FortiPAM 1.6.1, FortiProxy 7.6.4 (check vendor advisory for all fixed versions)

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-545

Restart Required: Yes

Instructions:

1. Review vendor advisory for specific fixed versions. 2. Backup configuration. 3. Download and install appropriate firmware update. 4. Reboot device. 5. Verify fix applied.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative access to trusted hosts and implement strict access controls for administrative interfaces.

config system admin
edit <admin_user>
set trusthost1 <trusted_ip> <trusted_mask>
end

Enable Administrative Logging

all

Enable detailed logging of all administrative CLI commands to detect policy bypass attempts.

config log eventfilter
set admin enable
set cli enable
end

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate administrative interfaces
  • Enforce multi-factor authentication for all administrative accounts

🔍 How to Verify

Check if Vulnerable:

Check device version via CLI: 'get system status' and compare against affected versions list.

Check Version:

get system status | grep Version

Verify Fix Applied:

After patching, verify version is updated: 'get system status' and confirm version is not in affected range.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI commands from administrators
  • Administrative access from untrusted IP addresses
  • Trusted host policy modification attempts

Network Indicators:

  • Administrative access from non-standard IP ranges
  • Unexpected administrative protocol traffic

SIEM Query:

source="fortigate" AND (event_type="admin" OR event_type="cli") AND command="*trusthost*"

🔗 References

📤 Share & Export