Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code

Posted on August 13, 2025August 13, 2025 By CWS

Aug 13, 2025Ravie LakshmananVulnerability / Community Safety
Fortinet is alerting prospects of a vital safety flaw in FortiSIEM for which it stated there exists an exploit within the wild.
The vulnerability, tracked as CVE-2025-25256, carries a CVSS rating of 9.8 out of a most of 10.0.
“An improper neutralization of particular parts utilized in an OS command (‘OS Command Injection’) vulnerability [CWE-78] in FortiSIEM could enable an unauthenticated attacker to execute unauthorized code or instructions through crafted CLI requests,” the corporate stated in a Tuesday advisory.
The next variations are impacted by the flaw –

FortiSIEM 6.1, 6.2, 6.3, 6.4, 6.5, 6.6 (Migrate to a hard and fast launch)
FortiSIEM 6.7.0 by way of 6.7.9 (Improve to six.7.10 or above)
FortiSIEM 7.0.0 by way of 7.0.3 (Improve to 7.0.4 or above)
FortiSIEM 7.1.0 by way of 7.1.7 (Improve to 7.1.8 or above)
FortiSIEM 7.2.0 by way of 7.2.5 (Improve to 7.2.6 or above)
FortiSIEM 7.3.0 by way of 7.3.1 (Improve to 7.3.2 or above)
FortiSIEM 7.4 (Not affected)

Fortinet acknowledged in its advisory {that a} “sensible exploit code for this vulnerability was discovered within the wild,” however didn’t share any further specifics in regards to the nature of the exploit and the place it was discovered. It additionally famous that the exploitation code doesn’t seem to supply distinctive indicators of compromise (IoCs).
As workarounds, the community safety firm is recommending that organizations restrict entry to the phMonitor port (7900).
The disclosure comes a day after GreyNoise warned of a “vital spike” in brute-force visitors geared toward Fortinet SSL VPN gadgets, with dozens of IP addresses from america, Canada, Russia, and the Netherlands probing gadgets situated internationally.

The Hacker News Tags:Code, CVE202525256, Exploit, Fortinet, FortiSIEM, InTheWild, Vulnerability, Warns

Post navigation

Previous Post: Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year
Next Post: FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User

Related Posts

Wazuh for Regulatory Compliance The Hacker News
BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware The Hacker News
Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks The Hacker News
3,500 Websites Hijacked to Secretly Mine Crypto Using Stealth JavaScript and WebSocket Tactics The Hacker News
NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware The Hacker News
Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News