Description:
Fortinet released security advisories to address multiple vulnerabilities in Fortinet systems. An attacker could exploit these vulnerabilities by sending specially crafted requests to an affected system.
Affected Systems:
- FortiClientEMS version 7.0 (all versions), version 7.2.0 through 7.2.10, version 7.4.0 through 7.4.1, version 7.4.3 through 7.4.4
- FortiFone version 3.0.13 through 3.0.23, version 7.0.0 through 7.0.1
- FortiOS version 6.4.0 through 6.4.16, version 7.0.0 through 7.0.17, version 7.2.0 through 7.2.11, version 7.4.0 through 7.4.8, version 7.6.0 through 7.6.3
- FortiSASE version 25.1.a.2, version 25.2.b
- FortiSIEM version 6.7.0 through 6.7.10, version 7.0.0 through 7.0.4, version 7.1.0 through 7.1.8, version 7.2.0 through 7.2.6, version 7.3.0 through 7.3.4, version 7.4.0
- FortiSandbox version 4.0 (all versions), version 4.2 (all versions), version 4.4 (all versions), version 5.0.0 through 5.0.4
- FortiSwitchManager version 7.0.0 through 7.0.5, version 7.2.0 through 7.2.6
- FortiVoice version 7.0.0 through 7.0.7, version 7.2.0 through 7.2.2
For detailed information of the affected products, please refer to the section 'Affected Products' of corresponding security advisory at vendor's website.
Impact:
Successful exploitation of the vulnerabilities could lead to remote code execution, information disclosure, security restriction bypass or tampering on an affected system.
Recommendation:
Patches for affected systems are available. System administrators of affected systems should follow the recommendations provided by the vendor and take immediate actions to mitigate the risk.
More Information:
- https://fortiguard.fortinet.com/psirt/FG-IR-25-084
- https://fortiguard.fortinet.com/psirt/FG-IR-25-260
- https://fortiguard.fortinet.com/psirt/FG-IR-25-735
- https://fortiguard.fortinet.com/psirt/FG-IR-25-772
- https://fortiguard.fortinet.com/psirt/FG-IR-25-778
- https://fortiguard.fortinet.com/psirt/FG-IR-25-783
- https://www.hkcert.org/security-bulletin/fortinet-products-remote-code-execution-vulnerabilities_20260114
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25249
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47855
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58693
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59922
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64155
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67685