Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical FortiWeb WAF Flaw Exploited in the Wild, Enabling Full Admin Takeover

Critical FortiWeb WAF Flaw Exploited in the Wild, Enabling Full Admin Takeover

Posted on November 15, 2025November 15, 2025 By CWS

Fortinet has issued an pressing advisory warning of a important vulnerability in its FortiWeb net software firewall (WAF) product, which attackers are actively exploiting within the wild.

Recognized as CVE-2025-64446, the flaw stems from improper entry management within the GUI element, permitting unauthenticated risk actors to execute administrative instructions and doubtlessly seize full management of affected methods.

The vulnerability, categorised as a relative path traversal difficulty (CWE-23), allows attackers to craft malicious HTTP or HTTPS requests that bypass authentication.

This might result in the creation of unauthorized administrator accounts, granting full entry to the system’s configuration and delicate knowledge. Fortinet’s Product Safety Incident Response Staff (PSIRT) confirmed lively exploitation and urged rapid patching to mitigate dangers.

With a CVSS v3.1 base rating of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), the flaw earns a “Crucial” severity ranking per Nationwide Vulnerability Database (NVD) requirements. It impacts a number of FortiWeb variations throughout branches 8.0, 7.6, 7.4, 7.2, and seven.0. Particularly:

FortiWeb 8.0.0 by way of 8.0.1

FortiWeb 7.6.0 by way of 7.6.4

FortiWeb 7.4.0 by way of 7.4.9

FortiWeb 7.2.0 by way of 7.2.11

FortiWeb 7.0.0 by way of 7.0.11

Customers ought to improve to the newest patched variations: 8.0.2 or above, 7.6.5 or above, 7.4.10 or above, 7.2.12 or above, or 7.0.12 or above, respectively. Detailed CVRF and CSAF information can be found on FortiGuard for automated integration.

As a short lived workaround, Fortinet recommends disabling HTTP or HTTPS entry on internet-facing interfaces, aligning with greatest practices that restrict administration entry to inner networks solely. This reduces publicity considerably however doesn’t eradicate the risk fully.

Publish-upgrade, organizations should audit configurations and logs for indicators of compromise, equivalent to sudden admin account additions or modifications. Fortinet emphasised reviewing entry patterns to detect any lingering unauthorized exercise.

This incident highlights the persistent dangers to community safety home equipment, that are prime targets for attackers searching for to pivot into broader environments.

As WAFs like FortiWeb defend net purposes from threats, they’ll additionally introduce ironic backdoors by way of their very own vulnerabilities. Safety consultants advise prioritizing patches for important infrastructure, particularly given the flaw’s ease of exploitation, as no privileges or person interplay are required.

Fortinet’s advisory, revealed at present, underscores the corporate’s dedication to speedy disclosure. For extra particulars, go to the FortiGuard PSIRT web page. As exploitation continues, unpatched methods stay extremely weak.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Admin, Critical, Enabling, Exploited, Flaw, FortiWeb, Full, Takeover, WAF, Wild

Post navigation

Previous Post: Fortinet Confirms Active Exploitation of Critical FortiWeb Vulnerability
Next Post: Lumma Stealer Uses Browser Fingerprinting to Collect Data and for Stealthy C&C Server Communications

Related Posts

Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution Cyber Security News
The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses Cyber Security News
FEMITBOT Network Abuses Telegram for Crypto Scams FEMITBOT Network Abuses Telegram for Crypto Scams Cyber Security News
Bloody Wolf Hackers Use NetSupport RAT in Targeted Attacks Bloody Wolf Hackers Use NetSupport RAT in Targeted Attacks Cyber Security News
Hackers Leveraging LLM Shared Chats to Steal Your Passwords and Crypto Hackers Leveraging LLM Shared Chats to Steal Your Passwords and Crypto Cyber Security News
Threat Actors Abuse Windows Run Prompt to Execute Malicious Command and Deploy DeerStealer Threat Actors Abuse Windows Run Prompt to Execute Malicious Command and Deploy DeerStealer Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark