CVE-2025-25252: Improper access control in Fortinet FortiOS
An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL VPN 7.6.0 through 7.6.2, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4 all versions may allow a remote attacker (e.g. a former admin whose account was removed and whose session was terminated) in possession of the SAML record of a user session to access or re-open that session via re-use of SAML record.
AI Analysis
Technical Summary
CVE-2025-25252 is a vulnerability in Fortinet FortiOS SSL VPN implementations across multiple versions (6.4.0, 7.0.0 through 7.0.16, 7.2.0 through 7.2.10, 7.4.0 through 7.4.6, and 7.6.0 through 7.6.2). The flaw stems from insufficient session expiration controls (CWE-613), specifically in the handling of SAML authentication records. When a user session is terminated or the user account is removed, the associated SAML session token should be invalidated to prevent reuse. However, due to improper access control, an attacker who has obtained a valid SAML record from a previous session can reuse this token to reopen or access the session remotely without needing to authenticate again or interact with the user. This scenario could occur if a former administrator or user’s session token was captured or retained. The vulnerability does not affect availability but impacts confidentiality and integrity by allowing unauthorized access to potentially sensitive VPN sessions. The CVSS 3.1 score of 4.3 reflects a medium severity, with network attack vector, high attack complexity, no privileges required, no user interaction, and partial confidentiality and integrity impact. No known exploits are currently reported in the wild. The vulnerability affects a broad range of FortiOS versions, indicating a long-standing issue in session management. Fortinet has not yet published patches or mitigation details at the time of this report.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access to internal networks via compromised or reused VPN sessions. Attackers with access to a valid SAML session token can bypass authentication controls, potentially gaining access to sensitive corporate resources, confidential data, and internal systems. This could lead to data breaches, espionage, or lateral movement within networks. The impact is particularly significant for organizations relying heavily on Fortinet FortiOS SSL VPN for remote access, including government agencies, financial institutions, healthcare providers, and critical infrastructure operators. The medium severity rating suggests limited direct damage but a meaningful risk of confidentiality and integrity compromise. Since no user interaction or authentication is required, the attack surface includes any exposed VPN endpoints. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially if attackers develop methods to capture or steal SAML tokens. European organizations with stringent data protection regulations (e.g., GDPR) must consider the compliance implications of unauthorized access incidents stemming from this vulnerability.
Mitigation Recommendations
1. Immediately audit and monitor VPN session logs for unusual session reuse or anomalies indicating token replay. 2. Enforce strict session timeout policies and ensure sessions are invalidated upon user logout or account removal. 3. Implement multi-factor authentication (MFA) for VPN access to reduce risk from stolen tokens. 4. Restrict access to SAML tokens and ensure secure storage and transmission to prevent interception. 5. Apply network segmentation to limit the impact of compromised VPN sessions. 6. Stay alert for official Fortinet patches or advisories and prioritize timely deployment once available. 7. Consider deploying additional endpoint security controls to detect unauthorized access attempts. 8. Educate administrators and users about secure session handling and the risks of token reuse. 9. If possible, rotate or revoke SAML tokens periodically to minimize token lifetime. 10. Coordinate with Fortinet support for guidance and potential workarounds until patches are released.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Switzerland
CVE-2025-25252: Improper access control in Fortinet FortiOS
Description
An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL VPN 7.6.0 through 7.6.2, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4 all versions may allow a remote attacker (e.g. a former admin whose account was removed and whose session was terminated) in possession of the SAML record of a user session to access or re-open that session via re-use of SAML record.
AI-Powered Analysis
Technical Analysis
CVE-2025-25252 is a vulnerability in Fortinet FortiOS SSL VPN implementations across multiple versions (6.4.0, 7.0.0 through 7.0.16, 7.2.0 through 7.2.10, 7.4.0 through 7.4.6, and 7.6.0 through 7.6.2). The flaw stems from insufficient session expiration controls (CWE-613), specifically in the handling of SAML authentication records. When a user session is terminated or the user account is removed, the associated SAML session token should be invalidated to prevent reuse. However, due to improper access control, an attacker who has obtained a valid SAML record from a previous session can reuse this token to reopen or access the session remotely without needing to authenticate again or interact with the user. This scenario could occur if a former administrator or user’s session token was captured or retained. The vulnerability does not affect availability but impacts confidentiality and integrity by allowing unauthorized access to potentially sensitive VPN sessions. The CVSS 3.1 score of 4.3 reflects a medium severity, with network attack vector, high attack complexity, no privileges required, no user interaction, and partial confidentiality and integrity impact. No known exploits are currently reported in the wild. The vulnerability affects a broad range of FortiOS versions, indicating a long-standing issue in session management. Fortinet has not yet published patches or mitigation details at the time of this report.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access to internal networks via compromised or reused VPN sessions. Attackers with access to a valid SAML session token can bypass authentication controls, potentially gaining access to sensitive corporate resources, confidential data, and internal systems. This could lead to data breaches, espionage, or lateral movement within networks. The impact is particularly significant for organizations relying heavily on Fortinet FortiOS SSL VPN for remote access, including government agencies, financial institutions, healthcare providers, and critical infrastructure operators. The medium severity rating suggests limited direct damage but a meaningful risk of confidentiality and integrity compromise. Since no user interaction or authentication is required, the attack surface includes any exposed VPN endpoints. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially if attackers develop methods to capture or steal SAML tokens. European organizations with stringent data protection regulations (e.g., GDPR) must consider the compliance implications of unauthorized access incidents stemming from this vulnerability.
Mitigation Recommendations
1. Immediately audit and monitor VPN session logs for unusual session reuse or anomalies indicating token replay. 2. Enforce strict session timeout policies and ensure sessions are invalidated upon user logout or account removal. 3. Implement multi-factor authentication (MFA) for VPN access to reduce risk from stolen tokens. 4. Restrict access to SAML tokens and ensure secure storage and transmission to prevent interception. 5. Apply network segmentation to limit the impact of compromised VPN sessions. 6. Stay alert for official Fortinet patches or advisories and prioritize timely deployment once available. 7. Consider deploying additional endpoint security controls to detect unauthorized access attempts. 8. Educate administrators and users about secure session handling and the risks of token reuse. 9. If possible, rotate or revoke SAML tokens periodically to minimize token lifetime. 10. Coordinate with Fortinet support for guidance and potential workarounds until patches are released.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- fortinet
- Date Reserved
- 2025-02-05T13:31:18.866Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee702b75ce224a0426b550
Added to database: 10/14/2025, 3:45:47 PM
Last enriched: 10/14/2025, 3:53:44 PM
Last updated: 10/16/2025, 2:49:30 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41253: CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') in VMware Spring Cloud Gateway Server Webflux
HighMicrosoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign
MediumCVE-2025-54658: Escalation of privilege in Fortinet FortiDLP
HighCVE-2025-53951: Escalation of privilege in Fortinet FortiDLP
MediumCVE-2025-53950: Information disclosure in Fortinet FortiDLP
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.