CVE-2025-54971

4.3 MEDIUM

📋 TL;DR

This vulnerability allows read-only administrators in Fortinet FortiADC to access external resource passwords through system logs. It affects multiple FortiADC versions from 6.2 through 7.4.0. The exposure occurs when passwords are logged in plaintext or insufficiently protected formats.

💻 Affected Systems

Products:
  • Fortinet FortiADC
Versions: 6.2 all versions, 7.0 all versions, 7.1 all versions, 7.2 all versions, 7.4.0
Operating Systems: FortiOS-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all configurations where external resources with passwords are configured and logged.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Read-only admin escalates privileges by obtaining credentials for external systems, potentially compromising connected infrastructure or using credentials for lateral movement.

🟠

Likely Case

Internal read-only admin accesses sensitive passwords for monitoring systems, databases, or external services, violating least privilege and potentially enabling further unauthorized access.

🟢

If Mitigated

With proper access controls and log monitoring, impact is limited to authorized personnel viewing sensitive data they shouldn't have access to, but no system compromise occurs.

🌐 Internet-Facing: LOW - This requires authenticated admin access, so internet-facing systems are only at risk if admin credentials are already compromised.
🏢 Internal Only: MEDIUM - Internal read-only admins can exploit this without additional authentication, making it a significant internal threat.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires read-only admin access and access to system logs where passwords are exposed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Fortinet advisory for specific patched versions

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-686

Restart Required: Yes

Instructions:

1. Review Fortinet advisory FG-IR-25-686. 2. Upgrade to patched version as specified by Fortinet. 3. Restart FortiADC services. 4. Verify logs no longer contain sensitive passwords.

🔧 Temporary Workarounds

Restrict log access

all

Limit read-only admin access to logs containing sensitive information

config system admin
edit [admin-username]
set accprofile "restricted_profile"
end

Disable sensitive logging

all

Configure logging to exclude sensitive password information

config log syslogd setting
set exclude-sensitive enable
end

🧯 If You Can't Patch

  • Implement strict access controls to limit which administrators can view system logs
  • Regularly audit log access and monitor for unusual log viewing patterns

🔍 How to Verify

Check if Vulnerable:

Check if read-only admin can view logs containing password strings or external resource credentials

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify that logs no longer display plaintext passwords for external resources when viewed by read-only admin

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to log files by read-only admins
  • Log entries containing password strings or credential patterns

Network Indicators:

  • Unusual log access patterns from read-only admin accounts

SIEM Query:

source="fortiadc" AND (event_type="log_access" OR message="*password*") AND user_role="read-only"

🔗 References

📤 Share & Export