Fortinet Issues Critical Warning on FortiSIEM Vulnerability (CVE-2025-25256) Amid Active Exploitation

August 13, 2025 — Fortinet has released a critical security advisory concerning a severe vulnerability in its FortiSIEM platform, confirming that exploit code for this flaw is already circulating in the wild.

The bug, tracked as CVE-2025-25256, holds a CVSS severity rating of 9.8 out of 10, placing it in the highest risk category.

According to Fortinet, the issue stems from an OS Command Injection vulnerability (CWE-78). This flaw could allow an unauthenticated attacker to execute arbitrary commands or code on affected systems by sending specially crafted CLI requests.

Impacted Versions

The following FortiSIEM versions are vulnerable:

  • FortiSIEM 6.1 to 6.6 – Migrate to a patched release
  • FortiSIEM 6.7.0 to 6.7.9 – Upgrade to 6.7.10 or later
  • FortiSIEM 7.0.0 to 7.0.3 – Upgrade to 7.0.4 or later
  • FortiSIEM 7.1.0 to 7.1.7 – Upgrade to 7.1.8 or later
  • FortiSIEM 7.2.0 to 7.2.5 – Upgrade to 7.2.6 or later
  • FortiSIEM 7.3.0 to 7.3.1 – Upgrade to 7.3.2 or later
  • FortiSIEM 7.4 – Not affected

Exploit Code Detected in the Wild

Fortinet confirmed that functional exploit code has been observed in real-world environments, though it did not provide details about its distribution or origin. The company also warned that the exploitation method does not produce clear indicators of compromise (IoCs), making detection more challenging.

Recommended Mitigations

While applying security updates is strongly advised, Fortinet recommends the following workaround for organizations unable to upgrade immediately:

  • Restrict access to the phMonitor port (7900) to minimize potential attack vectors.

Growing Threat Landscape

This disclosure arrives just one day after threat intelligence firm GreyNoise reported a sharp increase in brute-force activity targeting Fortinet SSL VPN devices. The surge involves numerous IP addresses from countries including the United States, Canada, Russia, and the Netherlands, scanning devices worldwide.

Source: https://thehackernews.com/2025/08/fortinet-warns-about-fortisiem.html