Skip to main content

CVE-2025-22251: Improper access control in Fortinet FortiOS

Low
VulnerabilityCVE-2025-22251cvecve-2025-22251
Published: Tue Jun 10 2025 (06/10/2025, 16:36:12 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

An improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in FortiOS 7.6.0, 7.4.0 through 7.4.5, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an unauthenticated attacker to inject unauthorized sessions via crafted FGSP session synchronization packets.

AI-Powered Analysis

AILast updated: 07/10/2025, 21:33:24 UTC

Technical Analysis

CVE-2025-22251 is a vulnerability identified in multiple versions of Fortinet's FortiOS, specifically versions 6.4.0, 7.0.0, 7.2.0, 7.4.0 through 7.4.5, and 7.6.0. The flaw arises from improper access control related to the communication channel intended for FGSP (Fortinet Group Session Protocol) session synchronization packets. This vulnerability is classified under CWE-923, indicating an improper restriction of communication channels to intended endpoints. An unauthenticated attacker can exploit this vulnerability by crafting malicious FGSP session synchronization packets that are injected into the communication channel. This injection allows the attacker to create unauthorized sessions within the FortiOS environment. Notably, the attack does not require any authentication or user interaction, but it does require access to the network (attack vector: adjacent network). The CVSS v3.1 base score is 3.0, indicating a low severity level, with the vector string CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:C. The impact primarily affects the integrity of the system by allowing unauthorized session injection, but it does not compromise confidentiality or availability. There are currently no known exploits in the wild, and no patches or mitigation links are provided in the data, suggesting that organizations should monitor Fortinet advisories closely for updates. The vulnerability affects a broad range of FortiOS versions, which are widely deployed in enterprise network security appliances for firewalling, VPN, and other security functions.

Potential Impact

For European organizations, the impact of CVE-2025-22251 could be significant in environments where FortiOS devices are deployed as critical network security infrastructure. Unauthorized session injection could allow attackers to bypass normal session management controls, potentially enabling lateral movement within the network or manipulation of session data. Although the vulnerability does not directly lead to data disclosure or denial of service, the integrity compromise could facilitate further attacks or unauthorized access escalation. Given the widespread use of Fortinet devices in European enterprises, telecommunications, and government networks, exploitation could undermine trust in network security controls and expose sensitive internal communications. The low CVSS score reflects the difficulty of exploitation (requiring adjacent network access and high attack complexity), but organizations with exposed or poorly segmented networks may be at higher risk. The lack of known exploits suggests this is a proactive disclosure, but European entities should treat this as a warning to assess their FortiOS deployments and network segmentation to prevent potential exploitation.

Mitigation Recommendations

1. Network Segmentation: Restrict access to FortiOS FGSP communication channels strictly to trusted devices and network segments. Use VLANs and firewall rules to isolate management and synchronization traffic. 2. Access Control Lists (ACLs): Implement ACLs on network devices to limit which IP addresses and devices can send FGSP packets to FortiOS devices, minimizing exposure to unauthorized sources. 3. Monitoring and Logging: Enable detailed logging of FGSP session synchronization traffic and monitor for anomalous or unexpected session injection attempts. 4. Firmware Updates: Regularly check Fortinet advisories for patches addressing CVE-2025-22251 and apply updates promptly once available. 5. Incident Response Preparedness: Develop and test incident response procedures specific to FortiOS session anomalies to quickly detect and respond to potential exploitation. 6. Vendor Engagement: Engage with Fortinet support to confirm if any interim mitigations or configuration changes can reduce risk until patches are released. 7. Network Access Controls: Employ network access control (NAC) solutions to ensure only authorized devices can communicate with FortiOS devices on the relevant ports and protocols.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-01-02T10:21:04.196Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f521b0bd07c39389d83

Added to database: 6/10/2025, 6:54:10 PM

Last enriched: 7/10/2025, 9:33:24 PM

Last updated: 8/15/2025, 6:03:20 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats