Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

FortiDDoS OS Command Injection Vulnerability Let Attackers Execute Unauthorized Commands

Posted on September 9, 2025September 9, 2025 By CWS

Fortinet has disclosed a medium-severity vulnerability in its FortiDDoS-F product line that would permit a privileged attacker to execute unauthorized instructions. Tracked as CVE-2024-45325, the flaw is an OS command injection vulnerability residing inside the product’s command-line interface (CLI).

The vulnerability, recognized as CWE-78, stems from an improper neutralization of particular components utilized in an OS command. An attacker with excessive privileges and native entry to the system may exploit this weak point by sending specifically crafted requests to the CLI.

A profitable exploit would permit the attacker to execute arbitrary code or instructions with the permissions of the applying, probably resulting in a full system compromise.

The vulnerability has been assigned a CVSSv3 rating of 6.5, categorizing it as medium severity.

The CVSS vector, AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, signifies that an attacker requires native entry and high-level privileges, and no consumer interplay is required.

Regardless of the excessive privilege requirement, the potential impression on confidentiality, integrity, and availability is excessive. The difficulty was internally found and reported by Théo Leleu of Fortinet’s Product Safety workforce.

Affected Variations and Mitigation

Fortinet has confirmed that a number of variations of FortiDDoS-F are affected by this vulnerability. The advisory, FG-IR-24-344, revealed on September 9, 2025, outlines the particular variations and the beneficial actions for directors.

VersionAffected RangeSolutionFortiDDoS-F 7.2Not affectedNot ApplicableFortiDDoS-F 7.07.0.0 by means of 7.0.2Upgrade to 7.0.3 or aboveFortiDDoS-F 6.6All versionsMigrate to a hard and fast releaseFortiDDoS-F 6.5All versionsMigrate to a hard and fast releaseFortiDDoS-F 6.4All versionsMigrate to a hard and fast releaseFortiDDoS-F 6.3All versionsMigrate to a hard and fast releaseFortiDDoS-F 6.2All versionsMigrate to a hard and fast releaseFortiDDoS-F 6.1All versionsMigrate to a hard and fast launch

Directors working susceptible variations are strongly urged to use the beneficial updates or migrate to a patched launch to stop potential exploitation.

Organizations utilizing FortiDDoS-F 7.0 ought to improve to model 7.0.3 instantly, whereas these on older branches (6.1 by means of 6.6) should plan a migration to a safe model.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:Attackers, Command, Commands, Execute, FortiDDoS, Injection, Unauthorized, Vulnerability

Post navigation

Previous Post: Beware of Phishing Email from Kimusky Hackers With Subject Spetember Tax Return Due Date Notice
Next Post: Salat Stealer Exfiltrates Browser Credentials Via Sophisticated C2 Infrastructure

Related Posts

Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments Cyber Security News
Sharepoint 0-day, Vmware Exploitation, Threats and Cyber Attacks Cyber Security News
Microsoft Defender for Endpoint Bug Triggers Numerous False BIOS Alerts Cyber Security News
Cybersecurity Industry Gains $1.7 Billion to Develop Cutting-Edge Protection Technologies Cyber Security News
Conversation with Amazon’s Senior Software Development Engineer Naman Jain Cyber Security News
Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data
  • New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways
  • OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs
  • Ransomware Actors Targeting Global Public Sectors and Critical Services in Targeted Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data
  • New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways
  • OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs
  • Ransomware Actors Targeting Global Public Sectors and Critical Services in Targeted Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News