Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22252: Escalation of privilege in Fortinet FortiProxy

0
Critical
VulnerabilityCVE-2025-22252cvecve-2025-22252
Published: Wed May 28 2025 (05/28/2025, 07:55:49 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiProxy

Description

A missing authentication for critical function in Fortinet FortiProxy versions 7.6.0 through 7.6.1, FortiSwitchManager version 7.2.5, and FortiOS versions 7.4.4 through 7.4.6 and version 7.6.0 may allow an attacker with knowledge of an existing admin account to access the device as a valid admin via an authentication bypass.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:53:28 UTC

Technical Analysis

CVE-2025-22252 is a critical vulnerability identified in Fortinet's FortiProxy (versions 7.6.0 through 7.6.1), FortiSwitchManager 7.2.5, and FortiOS versions 7.4.4 through 7.4.6 and 7.6.0. The root cause is a missing authentication check on a critical function, which allows an attacker who already knows a valid administrator username to bypass authentication entirely and gain administrative access to the device. This bypass occurs without requiring any privileges or user interaction, and can be exploited remotely over the network. The vulnerability impacts the core security mechanisms of these devices, potentially allowing attackers to manipulate network traffic, alter security configurations, and disrupt network availability. The CVSS v3.1 base score is 9.0, reflecting the vulnerability's ease of exploitation (network attack vector, low complexity), lack of required privileges or user interaction, and its impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability's critical nature demands immediate attention. Fortinet has not provided patch links in the provided data, but affected organizations should monitor Fortinet advisories closely for updates. The vulnerability affects widely deployed Fortinet products that are integral to enterprise network security architectures.

Potential Impact

The impact of CVE-2025-22252 is severe for organizations globally that rely on Fortinet FortiProxy, FortiSwitchManager, and FortiOS devices. An attacker exploiting this vulnerability can gain full administrative control over these devices, leading to complete compromise of network security functions. This includes the ability to intercept, modify, or block network traffic, disable security policies, and potentially pivot to other internal systems. The confidentiality of sensitive data passing through these devices is at risk, as is the integrity of network configurations and the availability of critical network services. Given Fortinet's widespread use in enterprises, service providers, and government networks, exploitation could lead to significant operational disruption, data breaches, and loss of trust. The lack of required privileges and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation once public proof-of-concept or exploit code becomes available. The vulnerability also poses risks to supply chain security where Fortinet devices are deployed as part of managed services.

Mitigation Recommendations

To mitigate CVE-2025-22252, organizations should immediately verify if their Fortinet devices run affected versions of FortiProxy, FortiSwitchManager, or FortiOS. They should prioritize upgrading to patched versions as soon as Fortinet releases them. In the interim, restrict network access to management interfaces of these devices using network segmentation, firewall rules, and VPNs to limit exposure to trusted administrators only. Implement strong multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. Regularly audit administrative accounts and remove or disable unused accounts to minimize attack surface. Monitor device logs and network traffic for unusual administrative access patterns or authentication bypass attempts. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect exploitation attempts. Additionally, consider deploying network anomaly detection tools to identify suspicious activities indicative of compromise. Maintain an incident response plan specifically addressing potential device compromise scenarios involving Fortinet products.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-01-02T10:21:04.196Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6836c5ad182aa0cae23deab9

Added to database: 5/28/2025, 8:13:33 AM

Last enriched: 2/26/2026, 8:53:28 PM

Last updated: 3/25/2026, 6:27:13 PM

Views: 131

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses