Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code

Posted on August 13, 2025August 13, 2025 By CWS

Aug 13, 2025Ravie LakshmananVulnerability / Community Safety
Fortinet is alerting prospects of a vital safety flaw in FortiSIEM for which it stated there exists an exploit within the wild.
The vulnerability, tracked as CVE-2025-25256, carries a CVSS rating of 9.8 out of a most of 10.0.
“An improper neutralization of particular parts utilized in an OS command (‘OS Command Injection’) vulnerability [CWE-78] in FortiSIEM could enable an unauthenticated attacker to execute unauthorized code or instructions through crafted CLI requests,” the corporate stated in a Tuesday advisory.
The next variations are impacted by the flaw –

FortiSIEM 6.1, 6.2, 6.3, 6.4, 6.5, 6.6 (Migrate to a hard and fast launch)
FortiSIEM 6.7.0 by way of 6.7.9 (Improve to six.7.10 or above)
FortiSIEM 7.0.0 by way of 7.0.3 (Improve to 7.0.4 or above)
FortiSIEM 7.1.0 by way of 7.1.7 (Improve to 7.1.8 or above)
FortiSIEM 7.2.0 by way of 7.2.5 (Improve to 7.2.6 or above)
FortiSIEM 7.3.0 by way of 7.3.1 (Improve to 7.3.2 or above)
FortiSIEM 7.4 (Not affected)

Fortinet acknowledged in its advisory {that a} “sensible exploit code for this vulnerability was discovered within the wild,” however didn’t share any further specifics in regards to the nature of the exploit and the place it was discovered. It additionally famous that the exploitation code doesn’t seem to supply distinctive indicators of compromise (IoCs).
As workarounds, the community safety firm is recommending that organizations restrict entry to the phMonitor port (7900).
The disclosure comes a day after GreyNoise warned of a “vital spike” in brute-force visitors geared toward Fortinet SSL VPN gadgets, with dozens of IP addresses from america, Canada, Russia, and the Netherlands probing gadgets situated internationally.

The Hacker News Tags:Code, CVE202525256, Exploit, Fortinet, FortiSIEM, InTheWild, Vulnerability, Warns

Post navigation

Previous Post: Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year
Next Post: FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User

Related Posts

FedRAMP at Startup Speed: Lessons Learned The Hacker News
State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments The Hacker News
Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets The Hacker News
PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse The Hacker News
Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access The Hacker News
Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog
  • Microsoft Exchange Server Vulnerabilities Let Attackers Spoof and Tamper Over Network
  • GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise
  • Multiple GitLab Vulnerabilities Enables Account Takeover and Stored XSS Exploitation
  • How to Secure Your GitHub Repositories

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog
  • Microsoft Exchange Server Vulnerabilities Let Attackers Spoof and Tamper Over Network
  • GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise
  • Multiple GitLab Vulnerabilities Enables Account Takeover and Stored XSS Exploitation
  • How to Secure Your GitHub Repositories

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News