CVE-2025-64471

4.9 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to bypass authentication on FortiWeb web application firewalls by using password hashes instead of actual passwords. Attackers can craft HTTP/HTTPS requests to authenticate without valid credentials. Affected systems include FortiWeb versions 7.0.0-7.0.11, 7.2.0-7.2.11, 7.4.0-7.4.10, 7.6.0-7.6.5, and 8.0.0-8.0.1.

💻 Affected Systems

Products:
  • Fortinet FortiWeb
Versions: 7.0.0 through 7.0.11, 7.2.0 through 7.2.11, 7.4.0 through 7.4.10, 7.6.0 through 7.6.5, 8.0.0 through 8.0.1
Operating Systems: FortiWeb OS
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations with affected versions are vulnerable. The vulnerability affects the authentication mechanism itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of FortiWeb management interface leading to configuration changes, rule bypass, and potential lateral movement to protected applications.

🟠

Likely Case

Unauthorized access to FortiWeb administrative interface allowing attackers to disable security rules, modify configurations, or exfiltrate sensitive data.

🟢

If Mitigated

Limited impact if strong network segmentation, multi-factor authentication, and strict access controls are already implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting HTTP/HTTPS requests but does not require authentication. Attackers need to obtain password hashes first, which could come from other breaches or hash dumping techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiWeb 8.0.2, 7.6.6, 7.4.11, 7.2.12, 7.0.12

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-984

Restart Required: Yes

Instructions:

1. Download the appropriate firmware version from Fortinet support portal. 2. Backup current configuration. 3. Upload and install the firmware update via GUI or CLI. 4. Reboot the FortiWeb appliance. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Management Access

all

Limit access to FortiWeb management interface to trusted IP addresses only

config system interface
edit port1
set allowaccess https ssh
set trust-ip 192.168.1.0 255.255.255.0
end

Enable Multi-Factor Authentication

all

Configure MFA for all administrative accounts to add an additional authentication layer

config system admin
edit admin
set two-factor enable
set two-factor authentication fortitoken
end

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FortiWeb management interface from untrusted networks
  • Enable comprehensive logging and monitoring for authentication attempts and configuration changes

🔍 How to Verify

Check if Vulnerable:

Check FortiWeb firmware version via GUI (System > Dashboard) or CLI (get system status)

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify firmware version is 8.0.2 or higher, 7.6.6 or higher, 7.4.11 or higher, 7.2.12 or higher, or 7.0.12 or higher

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful authentication with unusual patterns
  • Authentication logs showing hash-like strings in password fields
  • Multiple authentication attempts from single source with varying credentials

Network Indicators:

  • HTTP/HTTPS requests to authentication endpoints with unusually long or structured password parameters
  • Traffic to FortiWeb management interface from unexpected sources

SIEM Query:

source="fortiweb" AND (event_type="authentication" AND result="success") AND (password_length>64 OR password_contains="$")

🔗 References

📤 Share & Export