CVE-2025-59669

5.3 MEDIUM

📋 TL;DR

This vulnerability involves hard-coded credentials in Fortinet FortiWeb web application firewalls that could allow authenticated attackers with shell access to connect to the Redis service and access its data. Affected systems include FortiWeb versions 7.0 through 7.6.0. The vulnerability requires authenticated shell access to exploit.

💻 Affected Systems

Products:
  • Fortinet FortiWeb
Versions: 7.0 all versions, 7.2 all versions, 7.4 all versions, 7.6.0
Operating Systems: FortiOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated shell access to the device. All affected versions in default configuration are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker with shell access could access sensitive Redis data, potentially including configuration data, session information, or other cached data stored in Redis.

🟠

Likely Case

An authenticated malicious insider or compromised administrator account could access Redis data, potentially exposing sensitive configuration or cached application data.

🟢

If Mitigated

With proper access controls limiting shell access to trusted administrators only, the risk is significantly reduced as only authorized personnel could exploit the vulnerability.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated shell access to the device. The hard-coded credentials would need to be discovered or known to the attacker.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiWeb 7.6.1 and later

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-843

Restart Required: Yes

Instructions:

1. Log into FortiWeb management interface. 2. Navigate to System > Dashboard. 3. Check for available firmware updates. 4. Download and install FortiWeb 7.6.1 or later. 5. Reboot the device after installation completes.

🔧 Temporary Workarounds

Restrict Shell Access

all

Limit shell access to only trusted administrators and implement strict access controls.

Network Segmentation

all

Isolate FortiWeb management interfaces from general network access and implement strict firewall rules.

🧯 If You Can't Patch

  • Implement strict access controls to limit shell access to only essential, trusted administrators.
  • Monitor Redis service access logs for unauthorized connection attempts and implement network segmentation to isolate FortiWeb devices.

🔍 How to Verify

Check if Vulnerable:

Check FortiWeb version via CLI: 'get system status' or via web interface: System > Dashboard. If version is 7.0.x, 7.2.x, 7.4.x, or 7.6.0, the device is vulnerable.

Check Version:

get system status

Verify Fix Applied:

After patching, verify version is 7.6.1 or later using 'get system status' command or web interface dashboard.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized Redis connection attempts from shell users
  • Multiple failed authentication attempts to Redis service

Network Indicators:

  • Unexpected connections to Redis port (default 6379) from management interfaces

SIEM Query:

source="fortiweb" AND (event="redis_connection" OR port=6379) AND user!="authorized_admin"

🔗 References

📤 Share & Export