CVE-2025-25256: Proof of Concept Released for Critical Fortinet FortiSIEM Command Injection Vulnerability
Fortinet FortiSIEM设备存在严重命令注入漏洞(CVE-2025-25256),CVSSv3评分9.8。该漏洞允许远程攻击者执行任意代码,且难以检测。Fortinet已发布安全公告并提供修复版本。 2025-8-13 17:46:20 Author: www.tenable.com(查看原文) 阅读量:14 收藏


August 13, 2025

3 Min Read


Tenable Research Special Operations Proof of Concept Available Blog header

Exploit code is reportedly available for a critical command injection vulnerability affecting Fortinet FortiSIEM devices.

Background

On August 12, Fortinet published a security advisory (FG-IR-25-152) for CVE-2025-25256, a critical command injection vulnerability affecting Fortinet FortiSIEM.

CVEDescriptionCVSSv3
CVE-2025-25256Fortinet FortiSIEM Command Injection Vulnerability9.8

Analysis

CVE-2025-25256 is a critical operating system (OS) command injection vulnerability affecting Fortinet FortiSIEM. A remote, unauthenticated attacker can exploit this flaw to execute arbitrary code using specially crafted requests.

According to the advisory, exploitation of this flaw does not “produce distinctive” indicators of compromise (IoCs). As such, it may be difficult to identify that a device has been compromised.

Historical Exploitation of Fortinet Devices

Fortinet vulnerabilities have historically been common targets for cyber attackers, with 20 CVEs currently on the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) list. The following table outlines some of the most impactful Fortinet vulnerabilities in recent years.

Proof of concept

At the time the advisory was published by Fortinet on August 12, they warned that “practical exploit code” had been found in the wild, though they did not provide a link to the exploit. Tenable Research has attempted to identify a functional proof-of-concept (PoC) for this flaw, however, we have not successfully located one as of the time this blog was published.

Solution

The following table details the affected and fixed versions of Fortinet devices for CVE-2025-25256:

Product VersionAffected RangeFixed Version
FortiSIEM 5.4All Versions of 5.4Migrate to a fixed release
FortiSIEM 6.1All Versions of 6.1Migrate to a fixed release
FortiSIEM 6.2All Versions of 6.2Migrate to a fixed release
FortiSIEM 6.3All Versions of 6.3Migrate to a fixed release
FortiSIEM 6.4All Versions of 6.4Migrate to a fixed release
FortiSIEM 6.5All Versions of 6.5Migrate to a fixed release
FortiSIEM 6.6All Versions of 6.6Migrate to a fixed release
FortiSIEM 6.76.7.0 through 6.7.96.7.10 or above
FortiSIEM 7.07.0.0 through 7.0.37.0.4 or above
FortiSIEM 7.17.1.0 through 7.1.77.1.8 or above
FortiSIEM 7.27.2.0 through 7.2.57.2.6 or above
FortiSIEM 7.37.3.0 through 7.3.17.3.2 or above
FortiSIEM 7.4Not AffectedNot Applicable

Fortinet’s security advisory advises if immediate patching is not able to be performed, they recommend limiting access to the phMonitor port of 7900. We strongly recommend reviewing the advisory for updates as well as the latest on mitigation or indicators of compromise (IoCs).

Identifying affected systems

A list of Tenable plugins for this vulnerability can be found on the individual CVE page for CVE-2025-25256 as they’re released. This link will display all available plugins for this vulnerability, including upcoming plugins in our Plugins Pipeline.

Additionally, customers can utilize Tenable Attack Surface Management to identify public facing assets running Fortinet devices by using the following subscription:

Attack Surface Management subscription for Fortinet Devices

Get more information

Join Tenable's Research Special Operations (RSO) Team on the Tenable Community.

Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.


Scott Caveza

Scott Caveza

Senior Staff Research Engineer, Security Response

Scott joined Tenable in 2012 as a Research Engineer on the Nessus Plugins team. Over the years, he has written hundreds of plugins for Nessus, and reviewed code for even more from his time being a team lead and manager of the Plugins team. Previously leading the Security Response team and the Zero Day Research team, Scott is currently a member of the Security Response team, helping the research organization respond to the latest threats. He has over a decade of experience in the industry with previous work in the Security Operations Center (SOC) for a major domain registrar and web hosting provider. Scott is a current CISSP and actively maintains his GIAC GWAPT Web Application Penetration Tester certification.

Interests outside of work: Scott enjoys spending time with his family, camping, fishing and being outdoors. He also enjoys finding ways to break web applications and home renovation projects.

Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.


文章来源: https://www.tenable.com/blog/cve-2025-25256-proof-of-concept-released-for-critical-fortinet-fortisiem-command-injection
如有侵权请联系:admin#unsafe.sh