Article Details
Scrape Timestamp (UTC): 2025-11-14 17:08:09.509
Original Article Text
Click to Toggle View
Fortinet confirms silent patch for FortiWeb zero-day exploited in attacks. Fortinet has confirmed that it has silently patched a critical zero-day vulnerability in its FortiWeb web application firewall, which is now "massively exploited in the wild." The announcement follows reports of unauthenticated attackers exploiting an unknown FortiWeb path traversal flaw to create new administrative users on Internet-exposed devices. The attacks were first identified by threat intel firm Defused on October 6, which published a proof-of-concept exploit and reported that an "unknown Fortinet exploit (possibly a CVE-2022-40684 variant)" is being used to send HTTP POST requests to the /api/v2.0/cmdb/system/admin%3f/../../../../../cgi-bin/fwbcgi Fortinet endpoint to create local admin-level accounts. On Thursday, watchTowr Labs security researchers also demoed an exploit and released a tool called "FortiWeb Authentication Bypass Artifact Generator to help defenders identify vulnerable devices. Cybersecurity firm Rapid7 added that the flaw affects FortiWeb versions 8.0.1 and earlier, as it confirmed that the publicly available proof-of-concept exploit no longer works after updating to version 8.0.2. Today, Fortinet disclosed that attackers are actively exploiting a path confusion vulnerability (now tracked as CVE-2025-64446) in FortiWeb's GUI component, which allows unauthenticated attackers to execute administrative commands on unpatched systems via crafted HTTP or HTTPS requests. "Fortinet has observed this to be exploited in the wild," the company noted in a Friday security advisory, which confirmed that the zero-day has been silently patched in FortiWeb 8.0.2, released on October 28, three weeks after Defused's first report that the CVE-2025-64446 security flaw was being exploited in attacks. Federal agencies ordered to patch within a week CISA also added the CVE-2025-64446 path traversal flaw to its catalog of actively exploited vulnerabilities on Friday, ordering U.S. federal agencies to patch their systems by November 21. Admins who can't immediately upgrade to FortiWeb 8.0.2 should disable HTTP or HTTPS for all internet-facing management interfaces and ensure that access is restricted to trusted networks. Fortinet also advised customers to check their configuration and review logs for new unauthorized administrator accounts and other unexpected modifications. BleepingComputer contacted Fortinet with questions about these ongoing attacks, but we have yet to receive a response. In August, Fortinet also patched a critical command injection flaw (CVE-2025-25256) with publicly available exploit code in its FortiSIEM security monitoring solution, one day after cybersecurity company GreyNoise warned of a massive spike in brute-force attacks targeting Fortinet SSL VPNs. Secrets Security Cheat Sheet: From Sprawl to Control Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start. Get the cheat sheet and take the guesswork out of secrets management.
Daily Brief Summary
Fortinet has addressed a critical zero-day vulnerability in its FortiWeb application firewall, previously exploited by attackers to create unauthorized admin accounts on exposed devices.
The vulnerability, now identified as CVE-2025-64446, involves path traversal in FortiWeb's GUI, allowing unauthenticated command execution via crafted HTTP/HTTPS requests.
Security firm Defused first reported the flaw on October 6, with a proof-of-concept exploit demonstrating the vulnerability's potential impact on Internet-facing systems.
Fortinet released a silent patch in version 8.0.2 on October 28, three weeks after initial reports, closing the exploit path for versions 8.0.1 and earlier.
The Cybersecurity and Infrastructure Security Agency (CISA) has mandated U.S. federal agencies to patch affected systems by November 21 to mitigate potential risks.
Organizations unable to upgrade immediately are advised to disable HTTP/HTTPS on management interfaces and restrict access to trusted networks to prevent exploitation.
Fortinet advises reviewing system logs for unauthorized admin accounts and unexpected changes, ensuring configurations are secure against ongoing threats.