Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability

Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability

Posted on November 14, 2025November 14, 2025 By CWS

Fortinet on Friday warned of an exploited FortiWeb vulnerability that permits distant, unauthenticated attackers to realize administrative entry to the net software firewall home equipment.

Tracked as CVE-2025-64446 (CVSS rating of 9.1), the bug is described as a relative path traversal challenge that may be exploited through crafted HTTP or HTTPS requests to execute administrative instructions on the system.

“Fortinet has noticed this to be exploited within the wild,” the corporate famous in its advisory, with out offering extra particulars on the assault(s).

The flaw impacts FortiWeb variations 8.0.0 via 8.0.1, 7.6.0 via 7.6.4, 7.4.0 via 7.4.9, 7.2.0 via 7.2.11, and seven.0.0 via 7.0.11. The vulnerability was resolved in FortiWeb variations 8.0.2, 7.6.5, 7.4.10, 7.2.12, and seven.0.12.

On Friday, the US cybersecurity company CISA added CVE-2025-64446 to its Identified Exploited Vulnerabilities (KEV) catalog, urging federal companies to handle it inside per week.

Per Binding Operational Directive (BOD) 22-01, federal companies are required to resolve vulnerabilities newly added to the KEV checklist inside three weeks. The shorter patching timeframe supplied for the contemporary bug underlines its significance.

The Fortinet and CISA warnings, nonetheless, come a bit late. On Thursday, a number of safety companies warned of the in-the-wild exploitation of a vulnerability in FortiWeb model 8.0.1 and earlier home equipment.

WatchTowr identified that the assaults have been indiscriminately concentrating on FortiWeb home equipment globally, whereas PwnDefend and Rapid7 linked the assaults to an exploit Defused noticed on October 6. Defused printed proof-of-concept (PoC) code based mostly on the exploit.Commercial. Scroll to proceed studying.

Each PwnDefend and Rapid7 famous that the exploit permits attackers to create administrator accounts on weak units. On November 6, Rapid7 noticed a risk actor providing an alleged zero-day exploit concentrating on FortiWeb on a darkish net discussion board, however couldn’t hyperlink it to the exploited zero-day.

Based on watchTowr’s technical writeup, CVE-2025-64446 consists of two vulnerabilities, particularly a path traversal and an authentication bypass. By creating an admin account, the attackers can totally compromise the focused home equipment.

Though it made no point out of the safety defect in FortiWeb 8.0.2’s launch notes, Fortinet probably silently patched the vulnerability after studying of its in-the-wild exploitation in October, watchTowr factors out.

Responding to a SecurityWeek inquiry, Fortinet avoided sharing particulars on the noticed assaults or on when it discovered of the flaw’s exploitation.

“We’re conscious of this vulnerability and activated our PSIRT response and remediation efforts as quickly as we discovered of this matter, and people efforts stay ongoing,” a Fortinet spokesperson stated.

“We’re speaking immediately with affected clients to advise on any vital really useful actions. We urge our clients to seek advice from the advisory and comply with the steerage supplied [in] FG-IR-25-910,” the spokesperson continued.

Within the advisory, Fortinet recommends that clients disable HTTP/HTTPS for internet-accessible interfaces till they improve to a patched FortiWeb model.

After the improve has been carried out, clients ought to assessment their configuration and logs for sudden modifications, such because the presence of unauthorized administrator accounts.

Associated: Cisco ISE, CitrixBleed 2 Vulnerabilities Exploited as Zero-Days: Amazon

Associated: Excessive-Severity Vulnerabilities Patched by Fortinet and Ivanti

Associated: Cisco, Fortinet, Palo Alto Networks Gadgets Focused in Coordinated Marketing campaign

Associated:Firefox 145 and Chrome 142 Patch Excessive-Severity Flaws in Newest Releases

Security Week News Tags:Active, Confirms, Critical, Exploitation, Fortinet, FortiWeb, Vulnerability

Post navigation

Previous Post: Beware of Phishing Emails as Spam Filter Alerts Steal Your Email Logins in a Blink
Next Post: Critical FortiWeb WAF Flaw Exploited in the Wild, Enabling Full Admin Takeover

Related Posts

Technical Details Published for Critical Cisco IOS XE Vulnerability Technical Details Published for Critical Cisco IOS XE Vulnerability Security Week News
Cyberattack on Beer Giant Asahi Disrupts Production  Cyberattack on Beer Giant Asahi Disrupts Production  Security Week News
Chipmaker Patch Tuesday: Over 60 Vulnerabilities Patched by Intel Chipmaker Patch Tuesday: Over 60 Vulnerabilities Patched by Intel Security Week News
Cisco Patches High-Severity DoS, Privilege Escalation Vulnerabilities Cisco Patches High-Severity DoS, Privilege Escalation Vulnerabilities Security Week News
Hundreds Targeted in New Atomic macOS Stealer Campaign Hundreds Targeted in New Atomic macOS Stealer Campaign Security Week News
Fog Ransomware Attack Employs Unusual Tools Fog Ransomware Attack Employs Unusual Tools Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News