Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Fortinet Discloses Second Exploited FortiWeb Zero-Day in a Week

Posted on November 19, 2025November 19, 2025 By CWS

Fortinet on Tuesday introduced patches for 17 vulnerabilities, together with a zero-day resolved with the most recent FortiWeb updates.

Tracked as CVE-2025-58034 (CVSS rating of 6.7), the bug is described as an OS command injection subject that may be exploited by authenticated attackers to execute arbitrary code on the underlying system, through crafted HTTP requests or CLI instructions.

“Fortinet has noticed this to be exploited within the wild,” the seller notes in its advisory, with out offering particulars on the assaults.

That is the second FortiWeb zero-day publicly disclosed inside per week, after the corporate confirmed on November 14 that CVE-2025-64446 (CVSS rating of 9.1), a critical-severity path traversal subject, had been focused in assaults.

Fortinet patched each exploited vulnerabilities in FortiWeb variations 8.0.2, 7.6.6, 7.4.11, 7.2.12, and seven.0.12. Customers ought to replace their deployments as quickly as attainable.

Concurrently with Fortinet’s advisory on the second zero-day, the US cybersecurity company CISA added the safety defect to its Recognized Exploited Vulnerabilities (KEV) catalog, urging federal businesses to patch it inside per week.

The quick patching window granted by CISA underlines the significance of exploited FortiWeb bugs. Per Binding Operational Directive (BOD) 22-01, federal businesses sometimes have three weeks to resolve flaws newly added to KEV.

Of the remaining 16 vulnerabilities Fortinet disclosed on Tuesday, three are high-severity flaws in FortiClient Home windows (CVE-2025-47761 and CVE-2025-46373) and FortiVoice (CVE-2025-58692) that would result in the execution of arbitrary code or instructions.Commercial. Scroll to proceed studying.

The corporate additionally addressed medium- and low-severity bugs in FortiExtender, FortiMail, FortiPAM, FortiSandbox, FortiClientWindows, FortiADC, FortiOS, FortiSwitchManager, FortiProxy, and FortiWeb.

Apart from CVE-2025-58034, Fortinet makes no point out of any of those safety defects being exploited within the wild. Further info might be discovered on the corporate’s safety advisories web page.

Associated: Fortinet Confirms Lively Exploitation of Crucial FortiWeb Vulnerability

Associated: Chrome 142 Replace Patches Exploited Zero-Day

Associated: Widespread Exploitation of XWiki Vulnerability Noticed

Associated: Crucial WatchGuard Firebox Vulnerability Exploited in Assaults

Security Week News Tags:Discloses, Exploited, Fortinet, FortiWeb, Week, ZeroDay

Post navigation

Previous Post: Microsoft Integrated Azure Firewall With AI-powered Security Copilot
Next Post: ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts

Related Posts

Cyberattack Targets International Criminal Court Security Week News
RaccoonO365 Phishing Service Disrupted, Leader Identified Security Week News
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Rockwell, Aveva, Schneider Security Week News
Wiz Warns of Ongoing Exploitation of Recent Ivanti Vulnerabilities Security Week News
Exploited ‘Post SMTP’ Plugin Flaw Exposes WordPress Sites to Takeover  Security Week News
European Airport Disruptions Caused by Ransomware Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
  • SolarWinds Patches Three Critical Serv-U Vulnerabilities
  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks
  • Cline AI Coding Agent Vulnerabilities Enables Prompt Injection, Code Execution, and Data Leakage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
  • SolarWinds Patches Three Critical Serv-U Vulnerabilities
  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks
  • Cline AI Coding Agent Vulnerabilities Enables Prompt Injection, Code Execution, and Data Leakage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News