Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25252: Improper access control in Fortinet FortiOS

0
Medium
VulnerabilityCVE-2025-25252cvecve-2025-25252
Published: Tue Oct 14 2025 (10/14/2025, 15:23:08 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL VPN 7.6.0 through 7.6.2, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4 all versions may allow a remote attacker (e.g. a former admin whose account was removed and whose session was terminated) in possession of the SAML record of a user session to access or re-open that session via re-use of SAML record.

AI-Powered Analysis

AILast updated: 10/21/2025, 16:48:53 UTC

Technical Analysis

CVE-2025-25252 is an Insufficient Session Expiration vulnerability (CWE-613) affecting Fortinet FortiOS SSL VPN versions 6.4 through 7.6.2. The flaw arises because the system fails to properly invalidate or expire SAML session tokens after user sessions end, including when an administrator account is removed and the session terminated. An attacker who has obtained a valid SAML session record from a terminated session can reuse this token to reopen the session remotely without needing to authenticate again. This improper access control allows unauthorized access to the VPN environment, potentially exposing internal network resources. The vulnerability spans multiple major FortiOS releases, indicating a systemic issue in session management. The CVSS 3.1 base score is 4.3, with vector AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N, indicating network attack vector, high attack complexity, no privileges or user interaction required, unchanged scope, and low confidentiality and integrity impact. No availability impact is noted. No public exploits have been reported yet, but the vulnerability could be exploited by former employees or attackers who have intercepted or retained session tokens. Fortinet has not yet published patches or mitigation guidance, so organizations must rely on compensating controls. The vulnerability highlights the critical importance of robust session invalidation mechanisms in VPN solutions, especially those using SAML authentication.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized access to internal networks via compromised or retained SAML session tokens. Attackers, including former employees or insiders, could regain access without re-authentication, potentially leading to data exposure or lateral movement within corporate networks. The impact on confidentiality and integrity is low to medium, as the attacker gains access equivalent to the original session user but cannot escalate privileges directly through this flaw. Availability is not affected. Organizations relying heavily on FortiOS SSL VPN for remote access, especially in sectors like finance, government, healthcare, and critical infrastructure, could face targeted exploitation attempts. The risk is heightened in environments where session tokens are not adequately protected or where session termination processes are not strictly enforced. The lack of known exploits reduces immediate threat but does not eliminate future risk, especially given the widespread use of Fortinet products in Europe.

Mitigation Recommendations

1. Immediately review and enforce strict session termination policies, ensuring that all user sessions, especially those of removed or former employees, are fully invalidated at the VPN and identity provider levels. 2. Implement short session lifetimes and frequent re-authentication requirements for VPN access to limit token reuse windows. 3. Monitor VPN logs for unusual session reactivations or repeated use of the same SAML tokens. 4. Restrict access to SAML session tokens and secure identity provider configurations to prevent token theft or leakage. 5. Where possible, deploy multi-factor authentication (MFA) that requires fresh authentication rather than relying solely on session tokens. 6. Apply network segmentation to limit the impact of unauthorized VPN access. 7. Stay alert for Fortinet security advisories and apply patches promptly once available. 8. Conduct regular audits of active sessions and user account statuses to detect anomalies. 9. Educate administrators on the importance of session management hygiene and immediate revocation of access upon employee departure. 10. Consider deploying additional endpoint security controls to detect and block unauthorized VPN access attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-02-05T13:31:18.866Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee702b75ce224a0426b550

Added to database: 10/14/2025, 3:45:47 PM

Last enriched: 10/21/2025, 4:48:53 PM

Last updated: 12/4/2025, 9:46:48 AM

Views: 124

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats