Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

FortiOS SSL-VPN Vulnerability Let Attackers Access full SSL-VPN settings

Posted on June 10, 2025June 10, 2025 By CWS

Fortinet has disclosed a brand new safety vulnerability affecting its FortiOS SSL-VPN web-mode that permits authenticated customers to achieve unauthorized entry to finish SSL-VPN configuration settings by specifically crafted URLs.

The vulnerability, designated as CVE-2025-25250, was printed at present and impacts a number of variations of the favored community safety platform.

The vulnerability stems from an “Publicity of Delicate Info to an Unauthorized Actor” weak point, categorised underneath CWE-200 within the Frequent Weak point Enumeration database.

Whereas the safety flaw requires consumer authentication to take advantage of, it presents vital privateness and safety issues because it permits attackers to view complete SSL-VPN settings that ought to stay restricted.

The vulnerability impacts an in depth vary of FortiOS variations, creating a considerable affect throughout Fortinet’s consumer base. FortiOS variations 6.4, 7.0, and seven.2 of their entirety require migration to mounted releases, as no patches can be found for these older variations.

More moderen variations present various publicity ranges: FortiOS 7.4.0 by 7.4.7 require fast upgrades to model 7.4.8 or increased, whereas FortiOS 7.6.0 customers ought to improve to model 7.6.1 or above.

Moreover, FortiSASE model 25.1.c was affected by this vulnerability, although Fortinet has already addressed the difficulty in FortiSASE model 25.2.a, requiring no motion from prospects utilizing the cloud-based safety service.

Regardless of the potential for info disclosure, Fortinet has assigned the vulnerability a low severity score with a CVSSv3 rating of three.9. This comparatively low rating displays the requirement for authentication earlier than exploitation can happen, limiting the vulnerability’s fast risk degree.

Nonetheless, safety consultants emphasize that any unauthorized entry to community configuration knowledge represents a severe safety concern, significantly in enterprise environments the place SSL-VPN settings could comprise delicate community topology info.

Fortinet strongly recommends that organizations working affected variations implement the prescribed upgrades instantly. The corporate has supplied a complete improve device at docs.fortinet.com/upgrade-tool to help directors in following the advisable improve path safely.

The vulnerability disclosure, catalogued as IR Quantity FG-IR-24-257, demonstrates Fortinet’s dedication to clear safety reporting. Organizations ought to prioritize patching efforts and evaluate their SSL-VPN entry controls to make sure correct authentication mechanisms stay in place in the course of the transition interval.

Safety groups ought to monitor for any uncommon SSL-VPN entry patterns and think about implementing further monitoring measures till upgrades are accomplished throughout all affected programs.

Automate risk response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Access, Attackers, FortiOS, Full, settings, SSLVPN, Vulnerability

Post navigation

Previous Post: FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware
Next Post: Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud

Related Posts

New North Korean IT Worker With Innocent Job Application Get Access to Organization’s Network Cyber Security News
Singularity Linux Kernel Rootkit with New Feature Prevents Detection Cyber Security News
What You Need to Pay Attention to Right Now  Cyber Security News
Telegram Based Raven Stealer Malware Steals Login Credentials, Payment Data and Autofill Information Cyber Security News
CISA Warns of D-Link Vulnerabilities Actively Exploited in Attacks Cyber Security News
Samourai Wallet Cryptocurrency Mixing Founders Jailed for Laundering Over $237 Million Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware
  • Threat Actors Leverage Real Enterprise Email Threads to Deliver Phishing Links
  • TP-Link Archer Vulnerability Let Attackers Take Control Over the Router
  • Gemini MCP Tool 0-day Vulnerability Allows Remote Attackers to Execute Arbitrary Code
  • Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware
  • Threat Actors Leverage Real Enterprise Email Threads to Deliver Phishing Links
  • TP-Link Archer Vulnerability Let Attackers Take Control Over the Router
  • Gemini MCP Tool 0-day Vulnerability Allows Remote Attackers to Execute Arbitrary Code
  • Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark