Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Fortinet FortiWeb Vulnerability Exploited in the Wild to Create Admin Accounts

Critical Fortinet FortiWeb Vulnerability Exploited in the Wild to Create Admin Accounts

Posted on November 14, 2025November 14, 2025 By CWS

A essential vulnerability in Fortinet’s FortiWeb Net Software Firewall (WAF) is being actively exploited by menace actors, doubtlessly as a zero-day assault vector.

The flaw, which allows unauthenticated attackers to realize administrator-level entry to the FortiWeb Supervisor panel and WebSocket command-line interface, was first highlighted by way of a proof-of-concept (PoC) exploit shared by cyber deception agency Defused on October 6, 2025. This discovery got here after Defused’s honeypot captured real-world makes an attempt focusing on uncovered FortiWeb situations.​

⚠️Unknown Fortinet exploit (presumably a CVE-2022-40684 variant) from 64.95.13.8 🇺🇸 ( BLNWX ) VirusTotal Detections: 0/95 🟢 JWT payload interprets into:{“username”: “admin”,”profname”: “prof_admin”,”vdom”: “root”,”loginname”: “admin”} pic.twitter.com/IdTcdxBuBf— Defused (@DefusedCyber) October 6, 2025

FortiWeb serves as an important protection mechanism, designed to detect and block malicious site visitors aimed toward internet functions, making it a primary goal for attackers in search of to undermine organizational safety postures.

The vulnerability seems to stem from a path traversal situation that enables distant exploitation with out prior entry, doubtlessly resulting in full system compromise and subsequent lateral motion inside networks.

Safety agency Rapid7 confirmed the exploit’s efficacy by way of testing, noting it efficiently creates unauthorized admin accounts like “hax0r” on weak variations.​

The testing revealed important variations in responses between the affected and patched variations.

On FortiWeb 8.0.1, launched in August 2025, a profitable exploit returns an HTTP 200 OK response with JSON particulars of the brand new admin consumer, together with encrypted passwords and entry profiles.

In distinction, model 8.0.2, launched on the finish of October, rejects the try with an HTTP 403 Forbidden error, indicating potential mitigation.

Rapid7 emphasised that whereas the general public PoC fails towards 8.0.2, it’s unclear if this replace features a deliberate silent repair or coincidental modifications.​

Exploitation within the wild has been reported since October 2025, with Defused claiming focused assaults on uncovered units. World scanning and spraying of the exploit have escalated, involving IP addresses from areas just like the US, Europe, and Asia.

Including to the urgency, on November 6, 2025, Rapid7 noticed an alleged zero-day exploit for FortiWeb provided on the market on a outstanding black hat discussion board, although its relation to this flaw stays unconfirmed.​

Hacker Discussion board claims

As of November 13, 2025, Fortinet has not issued official steerage, assigned a CVE identifier, or printed an identical advisory on its PSIRT feed.

Organizations utilizing FortiWeb variations earlier than 8.0.2 face instant danger and will prioritize emergency updates or isolate administration interfaces from public publicity. Defenders are additionally urged to scan logs for suspicious admin account creations and monitor Fortinet’s channels for impending disclosures.​

The absence of vendor acknowledgment heightens issues, particularly given Fortinet’s historical past of focused assaults.

Researchers at watchTowr Labs have even launched instruments to detect weak situations by producing random admin customers.

This incident underscores the necessity for speedy patching in essential infrastructure, as broad exploitation may quickly observe preliminary focused hits. Updates to this story will incorporate any official responses from Fortinet.​

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Accounts, Admin, Create, Critical, Exploited, Fortinet, FortiWeb, Vulnerability, Wild

Post navigation

Previous Post: FortiWeb Authentication Bypass Vulnerability Exploited
Next Post: Beware of Fake Bitcoin Tool That Hides DarkComet RAT Malware With it

Related Posts

PickleScan 0-Day Vulnerabilities Enable Arbitrary Code Execution via Malicious PyTorch Models PickleScan 0-Day Vulnerabilities Enable Arbitrary Code Execution via Malicious PyTorch Models Cyber Security News
New Sophisticated Phishing Attack Mimic as Google Support to Steal Logins New Sophisticated Phishing Attack Mimic as Google Support to Steal Logins Cyber Security News
SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes SetupHijack Tool Exploits Race Conditions and Insecure File Handling in Windows Installer Processes Cyber Security News
New Attack Technique That Enables Attackers To Exfiltrate Git Credentials In Argocd New Attack Technique That Enables Attackers To Exfiltrate Git Credentials In Argocd Cyber Security News
An Open-Source Tool to See Through Encrypted Traffic in Linux systems An Open-Source Tool to See Through Encrypted Traffic in Linux systems Cyber Security News
Microsoft Security Keys May Require PIN After Recent Windows Updates Microsoft Security Keys May Require PIN After Recent Windows Updates Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark