Article Details
Scrape Timestamp (UTC): 2025-08-13 11:42:45.596
Source: https://thehackernews.com/2025/08/fortinet-warns-about-fortisiem.html
Original Article Text
Click to Toggle View
Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code. Fortinet is alerting customers of a critical security flaw in FortiSIEM for which it said there exists an exploit in the wild. The vulnerability, tracked as CVE-2025-25256, carries a CVSS score of 9.8 out of a maximum of 10.0. "An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in FortiSIEM may allow an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests," the company said in a Tuesday advisory. The following versions are impacted by the flaw - Fortinet acknowledged in its advisory that a "practical exploit code for this vulnerability was found in the wild," but did not share any additional specifics about the nature of the exploit and where it was found. It also noted that the exploitation code does not appear to produce distinctive indicators of compromise (IoCs). As workarounds, the network security company is recommending that organizations limit access to the phMonitor port (7900). The disclosure comes a day after GreyNoise warned of a "significant spike" in brute-force traffic aimed at Fortinet SSL VPN devices, with dozens of IP addresses from the United States, Canada, Russia, and the Netherlands probing devices located across the world.
Daily Brief Summary
Fortinet has issued a warning about a critical vulnerability in FortiSIEM, identified as CVE-2025-25256, with an exploit currently active in the wild.
The vulnerability, with a severe CVSS score of 9.8, allows unauthenticated attackers to execute unauthorized code via crafted CLI requests.
Affected versions of FortiSIEM are vulnerable to OS command injection, which could lead to significant security breaches if not addressed promptly.
Fortinet has not disclosed specific details about the exploit's nature or its geographical origin but confirmed the presence of practical exploit code.
Organizations are advised to limit access to the phMonitor port (7900) as a temporary workaround to mitigate potential exploitation risks.
The advisory follows GreyNoise's report of increased brute-force traffic targeting Fortinet SSL VPN devices, indicating heightened threat activity.
Businesses relying on FortiSIEM should prioritize patching and implement recommended security measures to prevent unauthorized access and potential data breaches.