Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild
Fortinet警告其FortiSIEM产品存在严重远程未认证命令注入漏洞(CVE-2025-25256),CVSS评分9.8。该漏洞影响多个版本(5.4至7.3),允许攻击者通过精心构造的CLI请求执行未经授权的代码或命令。尽管未明确为零日漏洞,但确有现成的exploit代码在野利用。建议用户尽快升级至支持版本以修复问题,并采取临时措施限制相关端口访问以降低风险。 2025-8-13 20:30:18 Author: www.bleepingcomputer.com(查看原文) 阅读量:12 收藏

Fortinet

Fortinet is warning about a remote unauthenticated command injection flaw in FortiSIEM that has in-the-wild exploit code, making it critical for admins to apply the latest security updates.

FortiSIEM is a central security monitoring and analytics system used for logging, network telemetry, and security incident alerts, serving as an integral part of security operation centers, where it's an essential tool in the hands of IT ops teams and analysts.

The product is generally used by governments, large enterprises, financial institutions, healthcare providers, and managed security service providers (MSSPs).

The flaw, tracked as CVE-2025-25256 and rated critical (CVSS: 9.8), impacts multiple branches of SIEM, from 5.4 up to 7.3.

"An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in FortiSIEM may allow an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests," describes Fortinet.

While Fortinet does not outright state that the flaw was exploited as a zero-day, they did confirm that functional exploit code exists for the flaw.

"Practical exploit code for this vulnerability was found in the wild," noted the vendor.

Fortinet says exploitation of this flaw does not produce distinctive IOCs to determine if a device has been compromised.

This disclosure comes a day after GreyNoise warned of a massive spike in brute-force attacks targeting Fortinet SSL VPNs earlier this month, followed by a switch to FortiManager. The network threat intelligence company warned that spikes of malicious traffic often precede the disclosure of a new vulnerability.

It is unclear if Fortinet's disclosure of  CVE-2025-25256 is related to GreyNoise's report.

Given the availability of an exploit proof of concept (PoC), organizations must apply the latest security updates for CVE-2025-25256 as soon as possible by upgrading to one of the following FortiSIEM versions:

  • FortiSIEM 7.3.2
  • FortiSIEM 7.2.6
  • FortiSIEM 7.1.8
  • FortiSIEM 7.0.4
  • FortiSIEM 6.7.10

FortiSIEM versions 5.4 to 6.6 are also vulnerable in all versions, but they are no longer supported and will not receive a patch for the flaw. Administrators managing older FortiSIEM versions are advised to migrate to a newer, actively supported release.

Fortinet also included a workaround of limiting access to the phMonitor on port 7900, indicating that this is the entry point for malicious exploitation.

It's important to note that such workarounds reduce exposure and buy time until an upgrade can be performed. However, they do not fix the underlying vulnerability.


文章来源: https://www.bleepingcomputer.com/news/security/fortinet-warns-of-fortisiem-pre-auth-rce-flaw-with-exploit-in-the-wild/
如有侵权请联系:admin#unsafe.sh