CVE-2025-64153
📋 TL;DR
This CVE describes an OS command injection vulnerability in Fortinet FortiExtender devices that allows authenticated attackers to execute arbitrary commands via crafted HTTP requests. The vulnerability affects multiple FortiExtender versions from 7.0 through 7.6.3. Attackers with valid credentials can potentially gain full control of affected devices.
💻 Affected Systems
- Fortinet FortiExtender
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the FortiExtender device leading to lateral movement into connected networks, data exfiltration, and persistent backdoor installation.
Likely Case
Unauthorized command execution leading to device configuration changes, credential harvesting, or use as a pivot point for further attacks.
If Mitigated
Limited impact if proper network segmentation and authentication controls prevent attacker access to vulnerable interfaces.
🎯 Exploit Status
Exploitation requires valid authentication credentials. The vulnerability is in a specific HTTP request handler.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: FortiExtender 7.6.4 and above, 7.4.8 and above
Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-739
Restart Required: Yes
Instructions:
1. Download the patched firmware from Fortinet support portal. 2. Backup current configuration. 3. Upload and install the new firmware via web interface or CLI. 4. Reboot the device. 5. Verify the new version is running.
🔧 Temporary Workarounds
Restrict Management Access
allLimit access to FortiExtender management interfaces to trusted IP addresses only
config system interface
edit <interface_name>
set allowaccess https ssh
set trust-ip-1 <trusted_ip>
end
Enforce Strong Authentication
allImplement multi-factor authentication and complex passwords for all administrative accounts
config system admin
edit <admin_user>
set password <complex_password>
set two-factor enable
end
🧯 If You Can't Patch
- Isolate FortiExtender devices in a dedicated management VLAN with strict access controls
- Implement network monitoring and alerting for suspicious HTTP requests to FortiExtender management interfaces
🔍 How to Verify
Check if Vulnerable:
Check FortiExtender firmware version via web interface or CLI command: get system status
Check Version:
get system status | grep Version
Verify Fix Applied:
Verify firmware version is 7.6.4+ or 7.4.8+ and check for any suspicious command execution in logs
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution in system logs
- Multiple failed authentication attempts followed by successful login
- HTTP requests with shell metacharacters in parameters
Network Indicators:
- Unusual outbound connections from FortiExtender devices
- HTTP requests to management interface from unexpected sources
SIEM Query:
source="fortiextender*" AND (http_uri="*;*" OR http_uri="*|*" OR http_uri="*`*" OR http_uri="*$(*" OR http_uri="*&*" OR http_uri="*>" OR http_uri="*<*")