Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical FortiSIEM Vulnerability Let Attackers to Execute Malicious Commands

Posted on August 13, 2025August 13, 2025 By CWS

A important safety vulnerability within the Fortinet FortiSIEM platform permits unauthenticated attackers to execute arbitrary instructions remotely. 

The vulnerability CVE-2025-25256, categorised as CWE-78 (OS Command Injection), has been actively exploited within the wild with sensible exploit code already circulating amongst menace actors.

Key Takeaways1. Essential FortiSIEM flaw actively exploited with PoC within the wild.2. Targets phMonitor port 7900; no clear IoCs.3. Improve to patched variations or migrate.

FortiSIEM Vulnerability

The vulnerability stems from improper neutralization of particular components utilized in working system instructions inside FortiSIEM’s structure. 

Particularly, the flaw permits distant unauthenticated command injection by means of crafted Command Line Interface (CLI) requests focusing on the system.

This represents a extreme safety danger as attackers can bypass authentication mechanisms totally and execute unauthorized code or instructions on weak programs.

The exploit leverages the phMonitor port 7900, which serves as the first assault vector for malicious actors. 

Safety researchers have confirmed that sensible exploit code for this vulnerability was found in lively use, indicating that menace actors are already weaponizing this flaw towards real-world targets. 

The exploitation code reportedly doesn’t produce distinctive Indicators of Compromise (IoCs), making detection significantly difficult for safety groups.

The vulnerability impacts a number of FortiSIEM variations throughout a number of main releases. Organizations operating FortiSIEM variations 6.1 by means of 6.6 face the best danger, as these variations require full migration to mounted releases fairly than easy upgrades. 

Danger FactorsDetailsAffected ProductsFortiSIEM 7.3.0–7.3.1, 7.2.0–7.2.5, 7.1.0–7.1.7, 7.0.0–7.0.3, 6.7.0–6.7.9, all variations of 6.6, 6.5, 6.4, 6.3, 6.2, 6.1, and 5.4ImpactArbitrary command executionExploit PrerequisitesNetwork entry to the phMonitor service on port 7900; no authentication requiredCVSS 3.1 Score9.8 (Essential)

Patch Accessible

For newer variations, particular improve paths can be found: FortiSIEM 7.3 customers ought to improve to model 7.3.2 or above, whereas model 7.2 customers must replace to 7.2.6 or greater. 

Equally, FortiSIEM 7.1 requires upgrading to 7.1.8 or above, and model 7.0 wants updating to 7.0.4 or newer.

FortiSIEM 6.7 customers can improve to model 6.7.10 or above to handle the vulnerability. Notably, FortiSIEM 7.4 stays unaffected by this safety flaw. 

Patched Variations

As an instantaneous workaround, Fortinet recommends limiting entry to the phMonitor port 7900 to scale back publicity till correct patches might be applied.

The advisory was initially printed on August 12, 2025, emphasizing the urgency for organizations to evaluate their FortiSIEM deployments and implement acceptable remediation measures instantly. 

Given the lively exploitation and availability of working exploit code, safety groups ought to prioritize this vulnerability of their patching schedules.

Enhance your SOC and assist your workforce shield your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attackers, Commands, Critical, Execute, FortiSIEM, Malicious, Vulnerability

Post navigation

Previous Post: Adobe Patches Over 60 Vulnerabilities Across 13 Products
Next Post: Multiple Chrome High-Severity Vulnerabilities Let Attackers Execute Arbitrary Code

Related Posts

APT Group 123 Actively Attacking Windows Systems to Deliver Malicious Payloads Cyber Security News
GitHub Outage Disrupts Core Services Globally for Users Cyber Security News
New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets Cyber Security News
INE Security Partners with Abadnet Institute for Cybersecurity Training Programs in Saudi Arabia Cyber Security News
Halo Security Honored with 2025 MSP Today Product of the Year Award Cyber Security News
Hackers Attacking Apache Tomcat Manager From 400 Unique IPs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ICS Patch Tuesday: Major Vendors Address Code Execution Vulnerabilities
  • Multiple Chrome High-Severity Vulnerabilities Let Attackers Execute Arbitrary Code
  • Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics
  • Critical FortiSIEM Vulnerability Let Attackers to Execute Malicious Commands
  • Adobe Patches Over 60 Vulnerabilities Across 13 Products

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ICS Patch Tuesday: Major Vendors Address Code Execution Vulnerabilities
  • Multiple Chrome High-Severity Vulnerabilities Let Attackers Execute Arbitrary Code
  • Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics
  • Critical FortiSIEM Vulnerability Let Attackers to Execute Malicious Commands
  • Adobe Patches Over 60 Vulnerabilities Across 13 Products

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News