Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22254: Escalation of privilege in Fortinet FortiOS

0
Medium
VulnerabilityCVE-2025-22254cvecve-2025-22254
Published: Tue Jun 10 2025 (06/10/2025, 16:36:17 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

An Improper Privilege Management vulnerability [CWE-269] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.1, FortiOS 7.4.0 through 7.4.6, FortiOS 7.2.0 through 7.2.10, FortiOS 7.0.0 through 7.0.16, FortiOS 6.4.0 through 6.4.15, FortiProxy 7.6.0 through 7.6.1, FortiProxy 7.4.0 through 7.4.7, FortiWeb 7.6.0 through 7.6.1, FortiWeb 7.4.0 through 7.4.6 allows an authenticated attacker with at least read-only admin permissions to gain super-admin privileges via crafted requests to Node.js websocket module.

AI-Powered Analysis

AILast updated: 01/14/2026, 14:45:01 UTC

Technical Analysis

CVE-2025-22254 is a privilege escalation vulnerability classified under CWE-269 (Improper Privilege Management) affecting Fortinet's FortiOS, FortiProxy, and FortiWeb products across multiple versions ranging from 6.4.0 to 7.6.1. The flaw resides in the Node.js websocket module used by these products, where an authenticated attacker with at least read-only administrative privileges can craft specific requests to escalate their privileges to super-admin level. This escalation grants full control over the device, enabling the attacker to manipulate configurations, disable security controls, and potentially pivot within the network. The vulnerability requires authentication but no user interaction, and the attack complexity is rated high, indicating some skill or knowledge is necessary to exploit it. The CVSS v3.1 score of 6.5 reflects a medium severity, with high impact on confidentiality, integrity, and availability, and an exploitability rating that includes network attack vector and high privileges required. No public exploits or active exploitation campaigns have been reported to date. The vulnerability affects a broad range of Fortinet products widely deployed in enterprise and service provider environments, making it a significant concern for network security. The root cause is improper privilege management in the websocket module, which fails to enforce correct access controls, allowing privilege escalation from read-only to full administrative rights.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Fortinet products in enterprise networks, government agencies, and critical infrastructure sectors. Successful exploitation can lead to full compromise of affected devices, resulting in unauthorized access to sensitive data, disruption of network security controls, and potential lateral movement within internal networks. This can impact confidentiality by exposing sensitive communications and credentials, integrity by allowing unauthorized configuration changes, and availability by disabling or disrupting network security functions. Given the role of Fortinet devices as firewalls, VPN gateways, and web application firewalls, exploitation could facilitate large-scale network breaches, data exfiltration, or denial of service conditions. The requirement for authenticated access limits the attack surface but does not eliminate risk, especially in environments where credentials may be compromised or where administrative interfaces are exposed to less trusted networks. The absence of known exploits in the wild provides a window for mitigation, but organizations must act swiftly to prevent potential future attacks.

Mitigation Recommendations

1. Apply vendor patches immediately once they are released for the affected FortiOS, FortiProxy, and FortiWeb versions to remediate the vulnerability. 2. Restrict administrative access to Fortinet devices by implementing network segmentation and limiting management interfaces to trusted, internal networks only. 3. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), for all administrative accounts to reduce the risk of credential compromise. 4. Regularly audit and monitor administrative accounts and access logs for unusual activity indicative of privilege escalation attempts. 5. Disable or restrict the use of the Node.js websocket module if feasible, or apply configuration changes recommended by Fortinet to mitigate exploitation vectors. 6. Conduct periodic vulnerability assessments and penetration testing focusing on administrative interfaces to detect potential weaknesses. 7. Educate administrators on the importance of safeguarding credentials and recognizing suspicious activity related to privilege escalation. 8. Implement network intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous websocket traffic patterns that may indicate exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-01-02T10:21:04.197Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f4f1b0bd07c393897d3

Added to database: 6/10/2025, 6:54:07 PM

Last enriched: 1/14/2026, 2:45:01 PM

Last updated: 2/7/2026, 4:13:55 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats