Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

FortiWeb Authentication Bypass Vulnerability Exploited

Posted on November 14, 2025November 14, 2025 By CWS

Menace actors are actively exploiting a essential authentication bypass vulnerability in Fortinet’s FortiWeb internet software firewall (WAF) worldwide, prompting defenders to intensify vigilance.

Researchers at watchTowr Labs have responded by releasing a Detection Artefact Generator script, designed to assist organizations scan their environments for susceptible FortiWeb home equipment and mitigate dangers swiftly.​

The vulnerability, tracked as CVE-2025-52970, stems from improper parameter dealing with in FortiWeb, enabling unauthenticated distant attackers to log in as any current person by way of crafted requests.

With a CVSS rating of seven.7, it requires some personal data of the machine however poses extreme dangers, together with privilege escalation and potential distant code execution on affected techniques.

Fortinet patched the flaw in variations 8.0.2 and later, however in-the-wild assaults have surged since a partial proof-of-concept surfaced publicly in August 2025, focusing on uncovered FortiWeb situations indiscriminately.

Safety companies report dozens of compromises, underscoring the urgency for quick patching amid ongoing exploitation campaigns.​

WatchTowr Labs’ open-source device, hosted on GitHub at watchTowr-vs-Fortiweb-AuthBypass, simplifies detection by simulating the bypass mechanism. The Python script generates a singular username and password (e.g., “35f36895”) and sends an exploit payload to the goal IP, comparable to python watchTowr-vs-Fortiweb-AuthBypass.py 192.168.1.99.

If profitable, it confirms vulnerability by creating a short lived person, alerting directors to remediate. Authored by Sina Kheirkhah (@SinSinology) and Jake Knott (@inkmoro), the script targets FortiWeb variations under 8.0.2, with specifics accessible by way of FortiGuard Labs PSIRT.​

Organizations ought to prioritize scanning internet-facing home equipment, making use of patches, and monitoring for anomalous logins. As provide chain assaults evolve, instruments like this empower proactive protection in a menace panorama the place WAFs sarcastically turn out to be entry factors.​

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Authentication, Bypass, Exploited, FortiWeb, Vulnerability

Post navigation

Previous Post: Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data

Related Posts

New Spear-Phishing Attack Targeting Financial Executives by Deploying NetBird Malware Cyber Security News
Researchers Uncover Link Between Belsen and ZeroSeven Cybercriminal Groups Cyber Security News
Threat Actors Abuse AI Website Creation App to Deliver Malware Cyber Security News
Microsoft Dismantles 300+ Websites Used to Distribute RaccoonO365 Phishing Service Cyber Security News
Microsoft Teams New Premium Feature Blocks Screenshots and Recordings During Meeting Cyber Security News
Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FortiWeb Authentication Bypass Vulnerability Exploited
  • Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data
  • Hackers Exploiting RMM Tools LogMeIn and PDQ Connect to Deploy Malware as a Normal Program
  • New Wave of Steganography Attacks: Hackers Hiding XWorm in PNGs 
  • Google Sues ‘Lighthouse’ Phishing-as-a-service Kit Behind Massive Phishing Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FortiWeb Authentication Bypass Vulnerability Exploited
  • Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data
  • Hackers Exploiting RMM Tools LogMeIn and PDQ Connect to Deploy Malware as a Normal Program
  • New Wave of Steganography Attacks: Hackers Hiding XWorm in PNGs 
  • Google Sues ‘Lighthouse’ Phishing-as-a-service Kit Behind Massive Phishing Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News