CVE-2025-22254: Escalation of privilege in Fortinet FortiOS
An Improper Privilege Management vulnerability [CWE-269] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.1, FortiOS 7.4.0 through 7.4.6, FortiOS 7.2.0 through 7.2.10, FortiOS 7.0.0 through 7.0.16, FortiOS 6.4.0 through 6.4.15, FortiProxy 7.6.0 through 7.6.1, FortiProxy 7.4.0 through 7.4.7, FortiWeb 7.6.0 through 7.6.1, FortiWeb 7.4.0 through 7.4.6 allows an authenticated attacker with at least read-only admin permissions to gain super-admin privileges via crafted requests to Node.js websocket module.
AI Analysis
Technical Summary
CVE-2025-22254 is a vulnerability classified as Improper Privilege Management (CWE-269) found in Fortinet's FortiOS and related products including FortiProxy and FortiWeb. The flaw exists in versions ranging from FortiOS 6.4.0 up to 7.6.1 and corresponding versions of FortiProxy and FortiWeb. The vulnerability arises from insufficient access control in the Node.js websocket module, which handles administrative communications. An attacker who has authenticated access with at least read-only administrative privileges can send specially crafted websocket requests that exploit this flaw to escalate their privileges to super-admin level. This escalation grants the attacker full control over the device, enabling them to modify configurations, disable security controls, and potentially pivot within the network. The CVSS v3.1 score of 6.5 indicates a medium severity with network attack vector, high privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. The attack complexity is high, meaning exploitation requires specific conditions and knowledge. No public exploits or active exploitation have been reported at the time of publication. The vulnerability affects a broad range of Fortinet products widely deployed in enterprise and service provider environments, making it a significant concern for network security.
Potential Impact
If exploited, this vulnerability allows an attacker with limited administrative access to gain full super-admin privileges, effectively compromising the entire device. This can lead to unauthorized changes in firewall rules, VPN configurations, user credentials, and logging settings, severely undermining network security. The attacker could disable security features, create persistent backdoors, or disrupt network availability. Given Fortinet's widespread use in critical infrastructure, enterprises, and government networks, the impact could extend to data breaches, service outages, and lateral movement within networks. The medium CVSS score reflects the need for prior authenticated access and higher attack complexity, which somewhat limits the attack surface but does not eliminate the risk in environments where read-only admin access is granted to multiple users or where credential compromise is possible.
Mitigation Recommendations
1. Apply vendor-provided patches or updates as soon as they become available for all affected FortiOS, FortiProxy, and FortiWeb versions. 2. Restrict administrative access to management interfaces using network segmentation, VPNs, or IP whitelisting to limit exposure. 3. Enforce strong authentication mechanisms, including multi-factor authentication, for all administrative accounts. 4. Regularly audit and minimize the number of users with any level of administrative access, especially read-only admin privileges. 5. Monitor logs and network traffic for unusual websocket activity or privilege escalation attempts. 6. Implement strict role-based access control policies to prevent unnecessary privilege assignments. 7. Consider disabling or isolating the Node.js websocket module if not required for operations. 8. Conduct regular security assessments and penetration testing to detect potential exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Australia, Canada, India, Brazil, Singapore, Netherlands
CVE-2025-22254: Escalation of privilege in Fortinet FortiOS
Description
An Improper Privilege Management vulnerability [CWE-269] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.1, FortiOS 7.4.0 through 7.4.6, FortiOS 7.2.0 through 7.2.10, FortiOS 7.0.0 through 7.0.16, FortiOS 6.4.0 through 6.4.15, FortiProxy 7.6.0 through 7.6.1, FortiProxy 7.4.0 through 7.4.7, FortiWeb 7.6.0 through 7.6.1, FortiWeb 7.4.0 through 7.4.6 allows an authenticated attacker with at least read-only admin permissions to gain super-admin privileges via crafted requests to Node.js websocket module.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-22254 is a vulnerability classified as Improper Privilege Management (CWE-269) found in Fortinet's FortiOS and related products including FortiProxy and FortiWeb. The flaw exists in versions ranging from FortiOS 6.4.0 up to 7.6.1 and corresponding versions of FortiProxy and FortiWeb. The vulnerability arises from insufficient access control in the Node.js websocket module, which handles administrative communications. An attacker who has authenticated access with at least read-only administrative privileges can send specially crafted websocket requests that exploit this flaw to escalate their privileges to super-admin level. This escalation grants the attacker full control over the device, enabling them to modify configurations, disable security controls, and potentially pivot within the network. The CVSS v3.1 score of 6.5 indicates a medium severity with network attack vector, high privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. The attack complexity is high, meaning exploitation requires specific conditions and knowledge. No public exploits or active exploitation have been reported at the time of publication. The vulnerability affects a broad range of Fortinet products widely deployed in enterprise and service provider environments, making it a significant concern for network security.
Potential Impact
If exploited, this vulnerability allows an attacker with limited administrative access to gain full super-admin privileges, effectively compromising the entire device. This can lead to unauthorized changes in firewall rules, VPN configurations, user credentials, and logging settings, severely undermining network security. The attacker could disable security features, create persistent backdoors, or disrupt network availability. Given Fortinet's widespread use in critical infrastructure, enterprises, and government networks, the impact could extend to data breaches, service outages, and lateral movement within networks. The medium CVSS score reflects the need for prior authenticated access and higher attack complexity, which somewhat limits the attack surface but does not eliminate the risk in environments where read-only admin access is granted to multiple users or where credential compromise is possible.
Mitigation Recommendations
1. Apply vendor-provided patches or updates as soon as they become available for all affected FortiOS, FortiProxy, and FortiWeb versions. 2. Restrict administrative access to management interfaces using network segmentation, VPNs, or IP whitelisting to limit exposure. 3. Enforce strong authentication mechanisms, including multi-factor authentication, for all administrative accounts. 4. Regularly audit and minimize the number of users with any level of administrative access, especially read-only admin privileges. 5. Monitor logs and network traffic for unusual websocket activity or privilege escalation attempts. 6. Implement strict role-based access control policies to prevent unnecessary privilege assignments. 7. Consider disabling or isolating the Node.js websocket module if not required for operations. 8. Conduct regular security assessments and penetration testing to detect potential exploitation attempts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- fortinet
- Date Reserved
- 2025-01-02T10:21:04.197Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f4f1b0bd07c393897d3
Added to database: 6/10/2025, 6:54:07 PM
Last enriched: 2/27/2026, 12:49:45 AM
Last updated: 3/25/2026, 11:44:26 AM
Views: 85
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.