Article Details
Scrape Timestamp (UTC): 2025-11-14 02:44:15.328
Original Article Text
Click to Toggle View
Fortinet FortiWeb flaw with public PoC exploited to create admin users. A Fortinet FortiWeb path traversal vulnerability is being actively exploited to create new administrative users on exposed devices without requiring authentication. The issue is fixed in FortiWeb 8.0.2, and admins are urged to update as soon as possible and check for signs of unauthorized access The exploitation was first spotted by threat intelligence company Defused on October 6, which reported an "Unknown Fortinet exploit" used against exposed devices to create admin accounts. Since then, attacks have increased, with threat actors now spraying the exploit globally. According to new research published by Daniel Card of PwnDefend and Defused, the flaw is a path traversal issue affecting the following Fortinet endpoint: Threat actors are sending HTTP POST requests to this path containing payloads that create local admin-level accounts on the targeted device. The exploitation observed by researchers includes multiple sets of created username and password combinations, with usernames including Testpoint, trader1, and trader. Passwords seen assigned to accounts include 3eMIXX43, AFT3$tH4ck, and AFT3$tH4ckmet0d4yaga!n. The attacks originated from a wide range of IP addresses, including: Security researchers at watchTowr Labs have confirmed the exploit, posting a video on X that demonstrates a failed FortiWeb login attempt, the execution of the exploit, and the successful login as the newly created admin user. watchTowr also released a tool called "FortiWeb Authentication Bypass Artifact Generator," which attempts to exploit the flaw by creating an admin user with an 8-character random username derived from a UUID. The tool was released to help defenders identify vulnerable devices. According to Rapid7, which tested the exploit across multiple versions, the flaw affects FortiWeb versions 8.0.1 and earlier. The flaw was fixed in version 8.0.2, which is believed to have been released at the end of October. However, BleepingComputer has been unable to find any disclosure of a FortiWeb vulnerability on Fortinet's PSIRT site that matches the one being exploited. BleepingComputer contacted Fortinet with questions about this reported exploitation and will update our story when we receive a response. As the vulnerability appears to be actively exploited in the wild, administrators should review their devices for unusual administrative accounts, check logs for requests to the fwbcgi path, and investigate any activity from the identified suspicious IP addresses. Administrators should also ensure these management interfaces are not reachable from the internet and are restricted to trusted networks or VPN-only access. The 2026 CISO Budget Benchmark It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026. Learn how top leaders are turning investment into measurable impact.
Daily Brief Summary
A path traversal vulnerability in Fortinet FortiWeb is actively exploited, allowing attackers to create admin users without authentication on exposed devices.
Researchers from Defused and PwnDefend identified the flaw, which affects FortiWeb versions 8.0.1 and earlier, with a fix available in version 8.0.2.
Attackers utilize HTTP POST requests to inject payloads, creating admin-level accounts with usernames like Testpoint and trader1, and passwords such as 3eMIXX43.
Exploitation is widespread, originating from various IP addresses, with security firm watchTowr Labs confirming the exploit through a demonstration video.
watchTowr released a tool to assist defenders in identifying vulnerable devices by generating admin users with random usernames.
Administrators are advised to update to FortiWeb 8.0.2, restrict management interface access, and monitor for unusual activity and unauthorized accounts.
Fortinet has yet to disclose the vulnerability on its PSIRT site, and further updates are pending as BleepingComputer seeks clarification from the company.