Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25253: Information disclosure in Fortinet FortiPAM

0
Medium
VulnerabilityCVE-2025-25253cvecve-2025-25253
Published: Tue Oct 14 2025 (10/14/2025, 15:22:56 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiPAM

Description

An Improper Validation of Certificate with Host Mismatch vulnerability [CWE-297] in FortiProxy version 7.6.1 and below, version 7.4.8 and below, 7.2 all versions, 7.0 all versions and FortiOS version 7.6.2 and below, version 7.4.8 and below, 7.2 all versions, 7.0 all versions ZTNA proxy may allow an unauthenticated attacker in a man-in-the middle position to intercept and tamper with connections to the ZTNA proxy

AI-Powered Analysis

AILast updated: 10/21/2025, 16:51:59 UTC

Technical Analysis

CVE-2025-25253 is an information disclosure and potential tampering vulnerability rooted in improper validation of certificates when there is a host mismatch in Fortinet's FortiProxy and FortiOS ZTNA proxy components, as well as FortiPAM version 1.4.1. The flaw is classified under CWE-297, indicating a failure to properly validate the identity of the server certificate against the expected hostname. This weakness allows an unauthenticated attacker who can position themselves as a man-in-the-middle on the network path between clients and the ZTNA proxy to intercept, read, and modify sensitive communications. The affected Fortinet products include FortiProxy versions 7.6.1 and below, 7.4.8 and below, 7.2 all versions, 7.0 all versions, and FortiOS versions 7.6.2 and below, 7.4.8 and below, 7.2 all versions, 7.0 all versions. FortiPAM version 1.4.1 is also impacted. The vulnerability has a CVSS v3.1 base score of 6.8, reflecting medium severity, with attack vector as adjacent network, high attack complexity, no privileges or user interaction required, and impacts to confidentiality, integrity, and availability. The vulnerability enables attackers to bypass the security guarantees of TLS connections by exploiting the certificate validation flaw, potentially leading to credential theft, session hijacking, or injection of malicious content. No public exploits have been reported yet, but the presence of this vulnerability in widely deployed Fortinet security products makes it a significant concern for organizations relying on Fortinet's ZTNA and PAM solutions for secure access and privileged account management.

Potential Impact

For European organizations, the impact of CVE-2025-25253 could be substantial, especially for those utilizing Fortinet FortiProxy, FortiOS ZTNA proxies, and FortiPAM in their security infrastructure. The vulnerability compromises the confidentiality and integrity of communications between users and the ZTNA proxy, potentially exposing sensitive data such as authentication tokens, credentials, and internal network information. This exposure could facilitate further lateral movement or privilege escalation within corporate networks. Additionally, tampering with traffic could disrupt availability or introduce malicious payloads, undermining trust in secure access mechanisms. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, face heightened risks of regulatory non-compliance and operational disruption. The medium severity rating indicates that while exploitation is not trivial, the potential damage to secure access and privileged account management systems could be significant if leveraged by skilled attackers. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2025-25253 effectively, European organizations should: 1) Monitor Fortinet's official advisories closely and apply security patches or updates as soon as they become available for FortiProxy, FortiOS, and FortiPAM products. 2) Enforce strict certificate validation policies, including hostname verification, within their network security configurations to prevent acceptance of mismatched certificates. 3) Implement network segmentation and restrict access to ZTNA proxies to trusted network segments to reduce the attack surface for MitM positioning. 4) Deploy network intrusion detection and prevention systems capable of identifying anomalous TLS handshake behaviors or certificate anomalies indicative of MitM attempts. 5) Conduct regular security audits and penetration testing focused on TLS configurations and certificate management practices. 6) Educate network administrators and security teams about the risks associated with certificate validation flaws and the importance of maintaining up-to-date security controls. 7) Consider deploying additional endpoint security controls to detect and prevent lateral movement in case of successful interception. These steps go beyond generic advice by focusing on certificate validation enforcement, network architecture adjustments, and proactive monitoring tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-02-05T13:31:18.867Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee6cbb1b3029e3c7e0402f

Added to database: 10/14/2025, 3:31:07 PM

Last enriched: 10/21/2025, 4:51:59 PM

Last updated: 12/3/2025, 7:35:05 PM

Views: 186

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats