Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
High-Severity Vulnerabilities Patched by Fortinet and Ivanti

High-Severity Vulnerabilities Patched by Fortinet and Ivanti

Posted on October 15, 2025October 15, 2025 By CWS

Fortinet and Ivanti have introduced their October 2025 Patch Tuesday updates, which repair probably severe vulnerabilities throughout their merchandise. 

Fortinet has printed 29 new advisories overlaying greater than 30 vulnerabilities. A number of of the issues have been assigned a ‘excessive severity’ score, together with CVE-2025-54988, which impacts FortiDLP attributable to its use of Apache Tika. Tika is impacted by a important flaw permitting an attacker to learn delicate knowledge or ship malicious requests to inner sources or third-party servers.

FortiDLP can be affected by CVE-2025-53951 and CVE-2025-54658, which may permit an authenticated attacker to escalate privileges to LocalService or Root by sending a specifically crafted request.

A privilege escalation vulnerability that permits an authenticated attacker to execute system instructions has been patched in FortiOS. The safety gap is tracked as CVE-2025-58325.

One other high-severity difficulty is CVE-2024-33507, which impacts FortiIsolator and permits a distant attacker to make use of specifically crafted cookies to deauthenticate logged-in directors (unauthenticated attacker) or to achieve write privileges (authenticated attacker).

A privilege escalation difficulty within the LaunchDaemon part of FortiClientMac has additionally been categorised as ‘excessive severity’. The difficulty is tracked as CVE-2025-57741. 

The final high-severity difficulty is CVE-2025-49201, which impacts FortiPAM and FortiSwitchManager and permits an attacker to bypass authentication via a brute-force assault.

Medium- and low-severity flaws have been patched in FortiOS, FortiPAM, FortiProxy, FortiClientMac, FortiClientWindows, FortiADC, FortiDLP, FortiSwitchManager, FortiManager, FortiAnalyzer, FortiSRA, FortiRecorder, FortiTester, FortiVoice, FortiWeb, FortiSASE, FortiSOAR, and FortiSIEM.Commercial. Scroll to proceed studying.

These weaknesses will be exploited for arbitrary code execution, DLL hijacking, acquiring delicate knowledge, bypassing safety features, inflicting a DoS situation, conducting XSS assaults, redirecting customers, and escalating privileges. 

There isn’t any proof that these vulnerabilities have been exploited within the wild. Lots of the points had been found internally by Fortinet. 

Ivanti has introduced the supply of patches for vulnerabilities in Endpoint Supervisor Cellular (EPMM) and Neurons for MDM. Ivanti has additionally printed an advisory for Endpoint Supervisor to supply mitigation choices for vulnerabilities disclosed earlier this month.

In EPMM, Ivanti addressed three high-severity flaws that may be exploited by an authenticated attacker with admin privileges to execute arbitrary code. The corporate additionally fastened one medium-severity difficulty permitting an authenticated attacker to put in writing knowledge on the disk.

In Neurons for MDM, Ivanti fastened two high-severity points. One in all them permits an authenticated attacker with admin permissions to “unenroll arbitrary gadgets, inflicting the focused machine to vanish from the Unified Endpoint Supervisor UI”. The second difficulty is an MFA bypass that may be exploited by a distant, authenticated attacker. 

A medium-severity flaw permitting a distant, unauthenticated attacker to entry delicate consumer data through an API endpoint has additionally been fastened in Neurons for MDM.

Ivanti additionally mentioned it has no proof that any of those vulnerabilities are being exploited within the wild.

Nonetheless, each Ivanti and Fortinet product vulnerabilities are sometimes focused by menace actors and it’s vital that their prospects apply obtainable patches as quickly as doable.

Associated: CISA Analyzes Malware From Ivanti EPMM Intrusions

Associated: Cisco, Fortinet, Palo Alto Networks Gadgets Focused in Coordinated Marketing campaign

Associated: ZDI Drops 13 Unpatched Ivanti Endpoint Supervisor Vulnerabilities

Security Week News Tags:Fortinet, HighSeverity, Ivanti, Patched, Vulnerabilities

Post navigation

Previous Post: Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control
Next Post: Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped

Related Posts

Wide Range of Malware Delivered in React2Shell Attacks Wide Range of Malware Delivered in React2Shell Attacks Security Week News
0,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits $320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits Security Week News
AWS Trusted Advisor Tricked Into Showing Unprotected S3 Buckets as Secure AWS Trusted Advisor Tricked Into Showing Unprotected S3 Buckets as Secure Security Week News
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, CISA ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, CISA Security Week News
Fortinet Patches Exploited FortiCloud SSO Authentication Bypass Fortinet Patches Exploited FortiCloud SSO Authentication Bypass Security Week News
Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark