PT-2025-32875 · Fortinet · Fortisiem
Sina Kheirkhah
+1
·
Published
2025-08-12
·
Updated
2025-08-31
·
CVE-2025-25256
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
**Name of the Vulnerable Software and Affected Versions:**
Fortinet FortiSIEM versions 5.4.0 through 7.3.1
Fortinet FortiSIEM versions 6.1 through 7.3.1
Fortinet FortiSIEM versions 6.7.9 and earlier
Fortinet FortiSIEM versions 7.0.0 through 7.0.3
Fortinet FortiSIEM versions 7.1.0 through 7.1.7
Fortinet FortiSIEM versions 7.2.0 through 7.2.5
Fortinet FortiSIEM versions 7.3.0 through 7.3.1
**Description:**
Fortinet FortiSIEM is vulnerable to an improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability. This allows an unauthenticated attacker to execute arbitrary code or commands via crafted CLI requests. Active exploitation of this vulnerability has been confirmed, with exploit code available in the wild. The vulnerability affects the phMonitor port (TCP/7900).
**Recommendations:**
Fortinet FortiSIEM versions 5.4.0 through 7.3.1: Upgrade to version 7.3.2 or later.
Fortinet FortiSIEM versions 6.1 through 7.3.1: Upgrade to version 7.3.2 or later.
Fortinet FortiSIEM versions 6.7.9 and earlier: Upgrade to version 6.7.10 or later.
Fortinet FortiSIEM versions 7.0.0 through 7.0.3: Upgrade to version 7.0.4 or later.
Fortinet FortiSIEM versions 7.1.0 through 7.1.7: Upgrade to version 7.1.8 or later.
Fortinet FortiSIEM versions 7.2.0 through 7.2.5: Upgrade to version 7.2.6 or later.
As a temporary workaround, consider blocking access to the phMonitor port (TCP/7900).
Exploit
Fix
RCE
OS Command Injection
Weakness Enumeration
Related Identifiers
Affected Products
References · 123
- 🔥 https://github.com/watchtowrlabs/watchTowr-vs-FortiSIEM-CVE-2025-25256⭐ 1 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-25256 · Security Note
- https://bdu.fstec.ru/vul/2025-09821 · Security Note
- https://fortiguard.fortinet.com/psirt/FG-IR-25-152 · Vendor Advisory
- https://twitter.com/Alevskey/status/1955602842456092715 · Twitter Post
- https://twitter.com/jackgoesvirtual/status/1956653872916627657 · Twitter Post
- https://twitter.com/shah_sheikh/status/1955602540369744031 · Twitter Post
- https://twitter.com/compuchris/status/1956786169116578132 · Twitter Post
- https://twitter.com/watchtowrcyber/status/1956389777835503696 · Twitter Post
- https://twitter.com/The_Cyber_News/status/1956629262230065265 · Twitter Post
- https://twitter.com/the_yellow_fall/status/1955422242973872592 · Twitter Post
- https://labs.watchtowr.com/should-security-solutions-be-secure-maybe-were-all-wrong-fortinet-fortisiem-pre-auth-command-injection-cve-2025-25256 · Note
- https://twitter.com/helpnetsecurity/status/1955566726651035649 · Twitter Post
- https://twitter.com/ABabino/status/1955663598048739802 · Twitter Post
- https://twitter.com/2ktrapper10/status/1955694115921768853 · Twitter Post