Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25252: Improper access control in Fortinet FortiOS

0
Medium
VulnerabilityCVE-2025-25252cvecve-2025-25252
Published: Tue Oct 14 2025 (10/14/2025, 15:23:08 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL VPN 7.6.0 through 7.6.2, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4 all versions may allow a remote attacker (e.g. a former admin whose account was removed and whose session was terminated) in possession of the SAML record of a user session to access or re-open that session via re-use of SAML record.

AI-Powered Analysis

AILast updated: 01/14/2026, 14:54:44 UTC

Technical Analysis

CVE-2025-25252 is a vulnerability identified in Fortinet FortiOS SSL VPN implementations across multiple versions from 6.4.0 up to 7.6.2. The root cause is insufficient session expiration controls, specifically related to SAML-based authentication sessions. When a user, such as an administrator, is removed from the system and their account is deleted, the associated SAML session token should be invalidated to prevent further access. However, due to improper access control and session management, an attacker in possession of a previously valid SAML session token can reuse this token to re-establish a session without needing to authenticate again. This scenario is particularly concerning if the attacker is a former admin or insider who retained a session token after account removal. The vulnerability does not require privileges or user interaction, but the attacker must have the SAML session record, which may be obtained through prior access or interception. The CVSS 3.1 score of 4.3 reflects a medium severity, with network attack vector, high attack complexity, no privileges required, and no user interaction needed. The impact primarily affects confidentiality and integrity by enabling unauthorized access to VPN-protected resources. There are no known public exploits or patches at the time of reporting, emphasizing the need for proactive mitigation. Fortinet FortiOS is widely deployed in enterprise and government environments for secure remote access, making this vulnerability relevant for organizations relying on FortiOS SSL VPN for remote connectivity.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized access to internal networks and sensitive data via compromised or reused VPN sessions. Attackers who can reuse SAML session tokens may bypass authentication controls, potentially leading to data breaches, lateral movement within networks, and disruption of secure remote access. Sectors such as finance, healthcare, government, and critical infrastructure, which heavily rely on VPNs for secure remote work, are particularly vulnerable. The risk is amplified in environments where session invalidation upon user removal is not rigorously enforced. Additionally, the presence of former employees or contractors with retained session tokens could facilitate insider threats. Although the CVSS score is medium, the potential for persistent unauthorized access without detection can have significant operational and reputational consequences. The lack of known exploits currently provides a window for mitigation, but organizations should act promptly to prevent exploitation.

Mitigation Recommendations

1. Immediately invalidate all active sessions when user accounts are removed or privileges are changed, ensuring SAML session tokens cannot be reused. 2. Implement strict session timeout policies and enforce reauthentication for long-lived sessions. 3. Monitor VPN access logs for unusual session reuse patterns or anomalies indicative of session hijacking. 4. Upgrade FortiOS SSL VPN to the latest patched versions once available from Fortinet. 5. Employ multi-factor authentication (MFA) to add an additional layer of security beyond SAML tokens. 6. Conduct regular audits of user accounts and active sessions to detect and revoke orphaned or stale sessions. 7. Educate administrators and security teams about the risks of session reuse and the importance of session management hygiene. 8. Consider network segmentation and least privilege access to limit potential damage from compromised VPN sessions. 9. Use endpoint security solutions to detect and prevent unauthorized access attempts via VPN. 10. Engage with Fortinet support for guidance and monitor advisories for patches or workarounds.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-02-05T13:31:18.866Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee702b75ce224a0426b550

Added to database: 10/14/2025, 3:45:47 PM

Last enriched: 1/14/2026, 2:54:44 PM

Last updated: 1/19/2026, 9:54:55 AM

Views: 144

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats