CVE-2025-57740

7.5 HIGH

📋 TL;DR

A heap-based buffer overflow vulnerability in Fortinet's FortiOS, FortiPAM, and FortiProxy allows authenticated users to execute arbitrary code via crafted RDP bookmark connection requests. This affects multiple versions across all three products, potentially enabling attackers to gain control of affected systems.

💻 Affected Systems

Products:
  • FortiOS
  • FortiPAM
  • FortiProxy
Versions: FortiOS: 7.6.2 and below, 7.4.7 and below, 7.2.10 and below, 7.0 all, 6.4 all; FortiPAM: 1.5.0, 1.4.2 and below, 1.3 all, 1.2 all, 1.1 all, 1.0 all; FortiProxy: 7.6.2 and below, 7.4.3 and below, 7.2 all, 7.0 all
Operating Systems: Fortinet proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires RDP bookmark connection feature to be enabled and accessible to authenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root/admin privileges, enabling persistent access, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Authenticated attackers gaining elevated privileges and executing malicious code on vulnerable systems, potentially leading to data theft or system disruption.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and knowledge of RDP bookmark functionality. Heap-based overflows can be challenging to exploit reliably.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiOS 7.6.3+, 7.4.8+, 7.2.11+, 7.0.15+, 6.4.16+; FortiPAM 1.5.1+, 1.4.3+; FortiProxy 7.6.3+, 7.4.4+, 7.2.9+, 7.0.15+

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-756

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download appropriate firmware from Fortinet support portal. 3. Upload firmware to device via web GUI or CLI. 4. Install update following vendor instructions. 5. Reboot device. 6. Verify version and functionality.

🔧 Temporary Workarounds

Disable RDP bookmark connections

all

Temporarily disable RDP bookmark functionality to prevent exploitation.

config system rdp-bookmark
set status disable
end

Restrict access to RDP features

all

Limit which users/groups can access RDP bookmark functionality.

config user group
edit <group_name>
unset rdp-access
end

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable devices from critical systems
  • Enforce multi-factor authentication and least privilege access controls for all user accounts

🔍 How to Verify

Check if Vulnerable:

Check current firmware version via CLI: 'get system status' or web GUI System > Dashboard. Compare against affected versions list.

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify version is updated to patched version and test RDP bookmark functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • Unusual RDP connection attempts
  • Multiple failed authentication attempts followed by RDP access
  • Process creation from unexpected sources

Network Indicators:

  • Abnormal RDP traffic patterns to Fortinet devices
  • Unexpected outbound connections from Fortinet devices

SIEM Query:

source="fortinet" AND (event_type="rdp" OR event_type="bookmark") AND (user!="admin" OR src_ip!="trusted_network")

🔗 References

📤 Share & Export