CVE-2025-64153

7.2 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in Fortinet FortiExtender devices that allows authenticated attackers to execute arbitrary commands via crafted HTTP requests. The vulnerability affects multiple FortiExtender versions from 7.0 through 7.6.3. Attackers with valid credentials can potentially gain full control of affected devices.

💻 Affected Systems

Products:
  • Fortinet FortiExtender
Versions: 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, 7.2 all versions, 7.0 all versions
Operating Systems: FortiOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the vulnerable HTTP interface. All configurations within affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the FortiExtender device leading to lateral movement into connected networks, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Unauthorized command execution leading to device configuration changes, credential harvesting, or use as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if proper network segmentation and authentication controls prevent attacker access to vulnerable interfaces.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid authentication credentials. The vulnerability is in a specific HTTP request handler.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiExtender 7.6.4 and above, 7.4.8 and above

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-739

Restart Required: Yes

Instructions:

1. Download the patched firmware from Fortinet support portal. 2. Backup current configuration. 3. Upload and install the new firmware via web interface or CLI. 4. Reboot the device. 5. Verify the new version is running.

🔧 Temporary Workarounds

Restrict Management Access

all

Limit access to FortiExtender management interfaces to trusted IP addresses only

config system interface
edit <interface_name>
set allowaccess https ssh
set trust-ip-1 <trusted_ip>
end

Enforce Strong Authentication

all

Implement multi-factor authentication and complex passwords for all administrative accounts

config system admin
edit <admin_user>
set password <complex_password>
set two-factor enable
end

🧯 If You Can't Patch

  • Isolate FortiExtender devices in a dedicated management VLAN with strict access controls
  • Implement network monitoring and alerting for suspicious HTTP requests to FortiExtender management interfaces

🔍 How to Verify

Check if Vulnerable:

Check FortiExtender firmware version via web interface or CLI command: get system status

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify firmware version is 7.6.4+ or 7.4.8+ and check for any suspicious command execution in logs

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed authentication attempts followed by successful login
  • HTTP requests with shell metacharacters in parameters

Network Indicators:

  • Unusual outbound connections from FortiExtender devices
  • HTTP requests to management interface from unexpected sources

SIEM Query:

source="fortiextender*" AND (http_uri="*;*" OR http_uri="*|*" OR http_uri="*`*" OR http_uri="*$(*" OR http_uri="*&*" OR http_uri="*>" OR http_uri="*<*")

🔗 References

📤 Share & Export