CVE-2025-64155

9.8 CRITICAL

📋 TL;DR

This CVE describes an OS command injection vulnerability in Fortinet FortiSIEM that allows attackers to execute arbitrary commands via crafted TCP requests. The vulnerability affects multiple FortiSIEM versions from 6.7.0 through 7.4.0. With a CVSS score of 9.8, this represents a critical security risk requiring immediate attention.

💻 Affected Systems

Products:
  • Fortinet FortiSIEM
Versions: FortiSIEM 7.4.0, 7.3.0 through 7.3.4, 7.1.0 through 7.1.8, 7.0.0 through 7.0.4, 6.7.0 through 6.7.10
Operating Systems: All supported FortiSIEM platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All affected versions in default configuration are vulnerable. The vulnerability requires network access to the FortiSIEM management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary commands with high privileges, potentially leading to data exfiltration, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Unauthorized command execution leading to data theft, installation of backdoors, or disruption of security monitoring capabilities.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts from reaching vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public proof-of-concept exploits are available. The vulnerability can be exploited without authentication via TCP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiSIEM 7.4.1, 7.3.5, 7.1.9, 7.0.5, 6.7.11

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-772

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Fortinet support portal. 2. Backup current configuration. 3. Apply the patch following Fortinet's upgrade documentation. 4. Restart the FortiSIEM services. 5. Verify the patch was applied successfully.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to FortiSIEM management interfaces to trusted IP addresses only

iptables -A INPUT -p tcp --dport [FortiSIEM_port] -s [trusted_ip] -j ACCEPT
iptables -A INPUT -p tcp --dport [FortiSIEM_port] -j DROP

Disable Unnecessary Services

linux

Disable any unnecessary network services on FortiSIEM that might expose the vulnerable component

systemctl disable [unnecessary_service]
systemctl stop [unnecessary_service]

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FortiSIEM from untrusted networks
  • Deploy network-based intrusion prevention systems (IPS) with rules to detect and block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check FortiSIEM version via web interface or CLI. If version matches affected range and patch not applied, system is vulnerable.

Check Version:

ssh admin@fortisiem_ip 'show version' or check via web interface under System > Status

Verify Fix Applied:

Verify FortiSIEM version is updated to patched version (7.4.1, 7.3.5, 7.1.9, 7.0.5, or 6.7.11) and test with known exploit attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Failed authentication attempts followed by successful command execution
  • Suspicious process creation from FortiSIEM services

Network Indicators:

  • Unusual TCP traffic patterns to FortiSIEM management ports
  • Malformed TCP packets targeting FortiSIEM services
  • Command injection patterns in network traffic

SIEM Query:

source="fortisiem" AND (event_type="command_execution" OR process_name="sh" OR process_name="bash") AND user!="authorized_user"

🔗 References

📤 Share & Export