Cyber Posture

CVE-2025-64446

CriticalCISA KEVActive ExploitationPublic PoC

Published: 14 November 2025

Published
14 November 2025
Modified
21 November 2025
KEV Added
14 November 2025
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.9291 99.8th percentile
Risk Priority 95 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may create a local account to maintain access to victim systems.

Security Summary

CVE-2025-64446 is a relative path traversal vulnerability (CWE-23) affecting Fortinet FortiWeb web application firewalls in multiple versions, specifically 8.0.0 through 8.0.1, 7.6.0 through 7.6.4, 7.4.0 through 7.4.9, 7.2.0 through 7.2.11, and 7.0.0 through 7.0.11. It enables attackers to execute administrative commands on the system by sending crafted HTTP or HTTPS requests. The vulnerability carries a CVSS v3.1 base score of 9.8 (Critical), reflecting its network accessibility (AV:N), low attack complexity (AC:L), lack of required privileges or user interaction (PR:N/UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H).

An unauthenticated attacker can exploit this vulnerability remotely over the network with minimal complexity, requiring no privileges or user interaction. Successful exploitation grants the ability to execute arbitrary administrative commands, potentially leading to full system compromise, including data exfiltration, modification, or disruption of the FortiWeb appliance.

Fortinet's PSIRT advisory (FG-IR-25-910) provides details on the issue and likely mitigation steps, such as applying patches for affected versions. Additional technical analysis appears in a GitHub repository from WatchTowr Labs focused on FortiWeb authentication bypass techniques.

This vulnerability is cataloged in CISA's Known Exploited Vulnerabilities list, indicating active real-world exploitation. Security practitioners should prioritize patching affected FortiWeb instances.

Details

CWE(s)
CWE-23
KEV Date Added
14 November 2025

Affected Products

fortinet
fortiweb
7.0.0 — 7.0.12 · 7.2.0 — 7.2.12 · 7.4.0 — 7.4.10

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.008 Network Device CLI Execution
Adversaries may abuse scripting or built-in command line interpreters (CLI) on network devices to execute malicious command and payloads.
T1136.001 Local Account Persistence
Adversaries may create a local account to maintain access to victim systems.
Why these techniques?

Relative path traversal enables unauthenticated execution of administrative commands on FortiWeb (network appliance), facilitating public-facing application exploitation for initial access (T1190), network device CLI command execution (T1059.008), and local account creation as demonstrated in the PoC (T1136.001).

References