Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code

Aug 13, 2025Ravie LakshmananVulnerability / Network Security

FortiSIEM Vulnerability (CVE-2025-25256)

Fortinet is alerting customers of a critical security flaw in FortiSIEM for which it said there exists an exploit in the wild.

The vulnerability, tracked as CVE-2025-25256, carries a CVSS score of 9.8 out of a maximum of 10.0.

“An improper neutralization of special elements used in an OS command (‘OS Command Injection’) vulnerability [CWE-78] in FortiSIEM may allow an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests,” the company said in a Tuesday advisory.

The following versions are impacted by the flaw –

  • FortiSIEM 6.1, 6.2, 6.3, 6.4, 6.5, 6.6 (Migrate to a fixed release)
  • FortiSIEM 6.7.0 through 6.7.9 (Upgrade to 6.7.10 or above)
  • FortiSIEM 7.0.0 through 7.0.3 (Upgrade to 7.0.4 or above)
  • FortiSIEM 7.1.0 through 7.1.7 (Upgrade to 7.1.8 or above)
  • FortiSIEM 7.2.0 through 7.2.5 (Upgrade to 7.2.6 or above)
  • FortiSIEM 7.3.0 through 7.3.1 (Upgrade to 7.3.2 or above)
  • FortiSIEM 7.4 (Not affected)
Cybersecurity

Fortinet acknowledged in its advisory that a “practical exploit code for this vulnerability was found in the wild,” but did not share any additional specifics about the nature of the exploit and where it was found. It also noted that the exploitation code does not appear to produce distinctive indicators of compromise (IoCs).

As workarounds, the network security company is recommending that organizations limit access to the phMonitor port (7900).

The disclosure comes a day after GreyNoise warned of a “significant spike” in brute-force traffic aimed at Fortinet SSL VPN devices, with dozens of IP addresses from the United States, Canada, Russia, and the Netherlands probing devices located across the world.


Source: thehackernews.com…

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *