Cyber Posture

CVE-2023-25610

Critical

Published: 24 March 2025

Published
24 March 2025
Modified
24 July 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.1599 94.8th percentile
Risk Priority 29 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2023-25610 is a buffer underwrite (buffer underflow) vulnerability, classified under CWE-124, affecting the administrative interface of multiple Fortinet products. It impacts FortiOS versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.6, 6.4.0 through 6.4.11, and 6.2.12 and below; FortiProxy versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, and 2.0.12 and below; and FortiOS-6K7K versions 7.0.5, 6.4.0 through 6.4.10, and 6.2.0 through 6.2.10 and below.

A remote unauthenticated attacker can exploit this vulnerability by sending specifically crafted requests to the administrative interface, potentially achieving execution of arbitrary code or commands. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting critical severity due to its network accessibility, low complexity, lack of required privileges or user interaction, and high impact on confidentiality, integrity, and availability.

Mitigation details are provided in the Fortinet PSIRT advisory at https://fortiguard.com/psirt/FG-IR-23-001.

Details

CWE(s)
CWE-124

Affected Products

fortinet
fortiweb
6.1.0 — 6.1.4 · 6.2.0 — 6.2.8 · 6.3.0 — 6.3.23
fortinet
fortiswitchmanager
7.0.0 — 7.0.2 · 7.2.0 — 7.2.2
fortinet
fortiswitch
7.0.0 — 7.0.7 · 7.2.0 — 7.2.4
fortinet
fortiproxy
1.1.0 — 7.0.9 · 7.2.0 — 7.2.3
fortinet
fortios-6k7k
7.0.5 · 6.0.4 — 6.2.13 · 6.4.2 — 6.4.12
fortinet
fortios
5.0.0 — 6.2.13 · 6.4.0 — 6.4.12 · 7.0.0 — 7.0.10
fortinet
fortimanager
7.2.0 · 6.0.0 — 6.0.12 · 6.2.0 — 6.2.11 · 6.4.0 — 6.4.12
fortinet
fortianalyzer
7.2.0 · 6.0.0 — 6.0.12 · 6.2.0 — 6.2.11 · 6.4.0 — 6.4.12

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Buffer underwrite in admin interface enables remote unauthenticated RCE via crafted requests (T1190: Exploit Public-Facing Application); results in arbitrary code/command execution on FortiOS (T1059.004: Unix Shell).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References