Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User

FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User

Posted on August 13, 2025August 13, 2025 By CWS

A important authentication bypass vulnerability in FortiWeb permits unauthenticated distant attackers to impersonate any current consumer on affected techniques. 

The vulnerability, tracked as CVE-2025-52970 with a CVSS rating of seven.7, impacts a number of FortiWeb variations and stems from improper parameter dealing with within the cookie parsing mechanism.

Key Takeaways1. CVE-2025-52970 lets attackers bypass authentication to log in as any consumer on FortiWeb techniques.2. FortiWeb 7.0-7.6 variations are weak.3. Attackers manipulate cookie parameters to power zero-filled encryption keys.

FortiWeb Out-of-Bounds Vulnerability

The vulnerability exploits an out-of-bounds learn situation in FortiWeb’s cookie dealing with code, particularly affecting the CWE-233 improper dealing with of parameters. 

Throughout cookie parsing, the system makes use of an “Period” parameter to pick encryption keys from a shared reminiscence array with out correct validation.

The FortiWeb session cookie comprises three elements: the Period (session kind identifier), Payload (encrypted session information together with username and position), and AuthHash (HMAC SHA1 signature). 

By manipulating the Period parameter to values between 2 and 9, attackers can power the system to learn uninitialized reminiscence places, doubtlessly leading to using null or zero-filled encryption keys.

Out-of-bounds Flaw

This manipulation successfully reduces the cryptographic safety to zero, because the chance of the important thing being all zeros modifications from 1/2^n (regular circumstances) to 1 (assured below exploitation). 

The researcher Aviv Y demonstrated this with a proof-of-concept concentrating on the /api/v2.0/system/standing.systemstatus endpoint, displaying profitable admin impersonation by way of crafted cookie requests.

Threat FactorsDetailsAffected Merchandise– FortiWeb 7.0.0 – 7.0.10- FortiWeb 7.2.0 – 7.2.10- FortiWeb 7.4.0 – 7.4.7- FortiWeb 7.6.0 – 7.6.3- FortiWeb 8.0: Not AffectedImpactAuthentication bypassExploit Stipulations– Personal machine information- Personal focused consumer information- Energetic consumer session throughout exploit- Brute-force validation quantity (~30 makes an attempt)CVSS 3.1 Score7.7 (Excessive Severity)

Mitigations

The vulnerability impacts FortiWeb variations 7.0.0 by way of 7.0.10, 7.2.0 by way of 7.2.10, 7.4.0 by way of 7.4.7, and seven.6.0 by way of 7.6.3, whereas FortiWeb 8.0 stays unaffected. 

Organizations should improve to patched variations: 7.0.11+, 7.2.11+, 7.4.8+, or 7.6.4+, respectively.

The exploit requires particular circumstances, together with information of personal machine data and an lively goal consumer session throughout exploitation.

Exploit chain 

Assault complexity includes brute-forcing an unknown validation quantity by way of the refresh_total_logins() perform, sometimes requiring fewer than 30 makes an attempt with O(N) computational price.

Safety researcher Aviv Y, who found this vulnerability below accountable disclosure, developed a whole exploit chain using the /ws/cli/open endpoint for CLI entry. 

Fortinet has already launched a patch for the vulnerability; customers are advisable to replace their techniques with the patches launched yesterday.

Increase your SOC and assist your workforce defend your small business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attackers, Authentication, Bypass, Existing, FortiWeb, Log, User, Vulnerability

Post navigation

Previous Post: Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code
Next Post: Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia

Related Posts

Microsoft OAuth Device Phishing Threat Escalates Microsoft OAuth Device Phishing Threat Escalates Cyber Security News
Fake Antivirus Site Spreads ValleyRAT Malware Fake Antivirus Site Spreads ValleyRAT Malware Cyber Security News
ShadowSyndicate Adopts Server Transition in Cyber Attacks ShadowSyndicate Adopts Server Transition in Cyber Attacks Cyber Security News
Hackers Leveraging LLM Shared Chats to Steal Your Passwords and Crypto Hackers Leveraging LLM Shared Chats to Steal Your Passwords and Crypto Cyber Security News
HackerOne Confirms Data Breach – Hackers Gained Unauthorized Access To Salesforce Instance HackerOne Confirms Data Breach – Hackers Gained Unauthorized Access To Salesforce Instance Cyber Security News
Malware Found in Top OpenClaw Skill Exposes Major Security Flaws Malware Found in Top OpenClaw Skill Exposes Major Security Flaws Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark