Multiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution

Multiple vulnerabilities have been discovered in Fortinet products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution in the context of the affected service account. Depending on the privileges associated with the service account, threat actors could then install programs; view, change, or delete data; or create new accounts with full user rights. Service accounts that are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Threat Intelligence
Fortinet is aware that CVE-2025-25256 has been exploited in the wild.
Systems Affected
FortiSIEM 5.4 all versions FortiSIEM 6.1 all versions FortiSIEM 6.2 all versions FortiSIEM 6.3 all versions FortiSIEM 6.4 all versions FortiSIEM 6.5 all versions FortiSIEM 6.6 all versions FortiSIEM 6.7.0 through 6.7.9 FortiSIEM 7.0.0 through 7.0.3 FortiSIEM 7.1.0 through 7.1.7 FortiSIEM 7.2.0 through 7.2.5 FortiSIEM 7.3.0 through 7.3.1 FortiManager 6.2 all versions​​​​​ FortiManager 6.4 all versions FortiManager 7.0.0 through 7.0.13 FortiManager 7.2.0 through 7.2.9 FortiManager 7.4.0 through 7.4.5 FortiManager 7.6.0 through 7.6.1 FortiManager Cloud 6.4 all versions FortiManager Cloud 7.0.1 through 7.0.13 FortiManager Cloud 7.2.1 through 7.2.9 FortiManager Cloud 7.4.1 through 7.4.5 FortiOS 6.0 all versions FortiOS 6.2.0 through 6.2.16 FortiOS 6.4 all versions FortiOS 7.0 all versions FortiOS 7.2 all versions FortiOS 7.4.0 FortiOS 7.4.0 through 7.4.7 FortiOS 7.6.0 through 7.6.2 FortiPAM 1.0 all versions FortiPAM 1.1 all versions FortiPAM 1.2 all versions FortiPAM 1.3 all versions FortiPAM 1.4.0 through 1.4.2 FortiPAM 1.5.0FortiProxy 2.0 all versions FortiProxy 7.0 all versions FortiProxy 7.2 all versions FortiProxy 7.4.0 through 7.4.1 FortiProxy 7.4.0 through 7.4.2 FortiProxy 7.4.0 through 7.4.3 FortiProxy 7.6.0 through 7.6.2 FortiSwitchManager 7.0.0 through 7.0.3 FortiSwitchManager 7.2.0 through 7.2.3
Risk
Government:
– Large and medium government entities: High
– Small government entities: Medium
Businesses:
– Large and medium business entities: High
– Small business entities: Medium
Home Users: Low
Recommendations
Apply the stable channel update provided by Fortinet to vulnerable systems immediately after appropriate testing. Apply the Principle of Least Privilege to all systems and services. Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack. Use vulnerability scanning to find potentially exploitable software vulnerabilities to remediate them. Use capabilities to detect and block conditions that may lead to or be indicative of a software exploit occurring. Architect sections of the network to isolate critical systems, functions, or resources. Use physical and logical segmentation to prevent access to potentially sensitive systems and information. Use a DMZ to contain any internet-facing services that should not be exposed from the internal network. Configure separate virtual private cloud (VPC) instances to isolate critical cloud systems. Use capabilities to detect and block conditions that may lead to or be indicative of a software exploit occurring.
References
Fortinet:
https://fortiguard.fortinet.com/psirt
https://fortiguard.fortinet.com/psirt/FG-IR-25-152
https://fortiguard.fortinet.com/psirt/FG-IR-25-173
https://fortiguard.fortinet.com/psirt/FG-IR-24-473
https://fortiguard.fortinet.com/psirt/FG-IR-23-209
https://fortiguard.fortinet.com/psirt/FG-IR-24-364
https://fortiguard.fortinet.com/psirt/FG-IR-24-042
 
CVE:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25256
​​​​​​​https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53744