PT-2026-2484 · Fortinet · Fortisiem
Published
2026-01-13
·
Updated
2026-02-20
·
CVE-2025-64155
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Fortinet FortiSIEM versions 6.7.0 through 7.4.0
Description
An improper neutralization of special elements used in an OS command ('OS command injection') vulnerability exists in Fortinet FortiSIEM. This allows an unauthenticated attacker to execute unauthorized code or commands via crafted TCP requests. The vulnerability affects the phMonitor service, specifically on port 7900. Public exploit code is available, and active exploitation has been observed. Attackers can achieve root-level access and potentially compromise the entire security monitoring infrastructure. Several threat actors are actively targeting this vulnerability, and it is being exploited in the wild. The vulnerability allows for arbitrary file writing and privilege escalation.
Recommendations
Upgrade to FortiSIEM version 7.4.1 or later.
Upgrade to FortiSIEM version 7.3.5 or later.
Upgrade to FortiSIEM version 7.2.7 or later.
Upgrade to FortiSIEM version 7.1.9 or later.
Restrict access to port 7900 as a temporary mitigation.
Monitor for suspicious web requests and new admin users/processes.
Exploit
Fix
LPE
RCE
DoS
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2026-00369
CVE-2025-64155
Affected Products
Fortisiem
References · 117
- 🔥 https://github.com/horizon3ai/CVE-2025-64155 · Exploit
- 🔥 https://github.com/purehate/CVE-2025-64155-hunter · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-64155 · Security Note
- https://bdu.fstec.ru/vul/2026-00369 · Security Note
- https://fortiguard.fortinet.com/psirt/FG-IR-25-772 · Vendor Advisory
- https://twitter.com/transilienceai/status/2012404674738143448 · Twitter Post
- https://twitter.com/AWNetworks/status/2012198137801105891 · Twitter Post
- https://twitter.com/shah_sheikh/status/2012272807611179128 · Twitter Post
- https://twitter.com/cyber_infoe/status/2011620155818922408 · Twitter Post
- https://twitter.com/ct_is/status/2012130679728001065 · Twitter Post
- https://twitter.com/Horizon3ai/status/2011206483258884211 · Twitter Post
- https://twitter.com/catnap707/status/2011565778865356874 · Twitter Post
- https://twitter.com/ThreatSynop/status/2011430475756159351 · Twitter Post
- https://twitter.com/ThreatSynop/status/2011952345496813668 · Twitter Post
- https://twitter.com/PurpleOps_io/status/2012155647886766267 · Twitter Post