Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of Fortinet FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks

Posted on June 26, 2025June 26, 2025 By CWS

CISA has issued a essential warning concerning a Fortinet FortiOS vulnerability that poses vital dangers to community safety infrastructure. 

On June 25, 2025, CISA added CVE-2019-6693 to its Identified Exploited Vulnerabilities (KEV) catalog, indicating that this hard-coded credentials flaw is being actively exploited in real-world assaults. 

Organizations utilizing Fortinet FortiOS methods now face a compulsory remediation deadline of July 16, 2025, as mandated by federal cybersecurity directives.

Abstract
1. CISA added CVE-2019-6693 to its Identified Exploited Vulnerabilities catalog on June 25, 2025, confirming energetic exploitation of Fortinet FortiOS methods in real-world assaults.
2. The vulnerability includes hard-coded encryption keys that enables attackers to decrypt delicate information from FortiOS configuration backup information.
3.Organizations utilizing affected Fortinet FortiOS methods have till July 16, 2025, to implement vendor mitigations or discontinue product use.

Arduous-Coded Credential Vulnerability

The inclusion of CVE-2019-6693 in CISA’s KEV catalog represents a major escalation within the risk panorama surrounding Fortinet’s FortiOS working system. 

This vulnerability, labeled beneath CWE-798 (Use of Arduous-coded Credentials), has demonstrated energetic exploitation patterns that prompted federal cybersecurity authorities to mandate a direct organizational response. 

This vulnerability permits risk actors to decipher delicate information contained inside FortiOS configuration backup information by way of data of the hard-coded encryption key. 

The exploitation mechanism depends on attackers having access to these backup information after which leveraging the predictable cryptographic key to decrypt delicate configuration information.

The technical classification beneath CWE-798 signifies this vulnerability represents a broader class of safety weaknesses the place software program comprises hard-coded credentials that can’t be modified with out modifying the supply code. 

Within the context of FortiOS methods, which means that default encryption keys used for configuration backups stay static and predictable throughout installations. 

Risk actors with data of those keys can probably entry delicate community configuration information, person credentials, and different essential safety parameters saved inside backup information.

The KEV catalog serves because the authoritative supply for vulnerabilities which were confirmed as exploited within the wild, making this designation notably regarding for community defenders and cybersecurity professionals.

The addition of this Fortinet vulnerability underscores the essential nature of hard-coded credential weaknesses in enterprise community infrastructure. 

Federal businesses and significant infrastructure operators should deal with this designation as a high-priority safety concern requiring instant consideration and useful resource allocation.

Danger FactorsDetailsAffected ProductsFortinet FortiOS ImpactAttackers decrypt delicate information in FortiOS configuration backup information by way of data of hard-coded encryption keyExploit Stipulations– Entry to FortiOS configuration backup files- Information of hard-coded encryption key- Skill to course of encrypted backup dataCVSS 3.1 Score6.5 (Medium)

Mitigations

Organizations working Fortinet FortiOS methods should implement vendor-provided mitigations earlier than the July 16, 2025, deadline established by CISA. 

The remediation necessities comply with relevant Binding Operational Directive (BOD) 22-01 steerage for cloud providers, emphasizing the federal authorities’s dedication to proactive vulnerability administration throughout essential infrastructure sectors.

Community directors ought to instantly seek the advice of Fortinet’s safety advisory FG-IR-19-007 for particular mitigation procedures and patch availability. 

Organizations unable to implement sufficient mitigations are directed to discontinue use of affected merchandise till correct safety measures might be established. 

This timeline displays the intense nature of energetic exploitation and the potential for continued risk actor exercise concentrating on susceptible FortiOS installations throughout enterprise networks.

Examine stay malware conduct, hint each step of an assault, and make sooner, smarter safety choices -> Attempt ANY.RUN now 

Cyber Security News Tags:Attacks, CISA, Credentials, Exploited, Fortinet, FortiOS, Hardcoded, Vulnerability, Warns

Post navigation

Previous Post: Critical Citrix NetScaler Flaw Exploited as Zero-Day
Next Post: Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa

Related Posts

Supply Chain Security Mitigating Third-Party Risks Cyber Security News
Google Warns of Cybercriminals Increasingly Attacking US Users to Steal Login Credentials Cyber Security News
New Android Malware GhostSpy Let Attacker Take Full Control Over Infected Devices Cyber Security News
10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code Cyber Security News
XenServer VM Tools for Windows Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
Adversarial Machine Learning – Securing AI Models Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Man Who Hacked Organizations to Advertise Security Services Pleads Guilty
  • Bonfy.AI Raises $9.5 Million for Adaptive Content Security Platform
  • Why Built-In Protections Aren’t Enough for Modern Data Resilience
  • CISA Warns AMI BMC Vulnerability Exploited in the Wild
  • Central Kentucky Radiology Data Breach Impacts 167,000

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Man Who Hacked Organizations to Advertise Security Services Pleads Guilty
  • Bonfy.AI Raises $9.5 Million for Adaptive Content Security Platform
  • Why Built-In Protections Aren’t Enough for Modern Data Resilience
  • CISA Warns AMI BMC Vulnerability Exploited in the Wild
  • Central Kentucky Radiology Data Breach Impacts 167,000

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News