Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25253: Information disclosure in Fortinet FortiProxy

0
Medium
VulnerabilityCVE-2025-25253cvecve-2025-25253
Published: Tue Oct 14 2025 (10/14/2025, 15:22:56 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiProxy

Description

An Improper Validation of Certificate with Host Mismatch vulnerability [CWE-297] in FortiProxy version 7.6.1 and below, version 7.4.8 and below, 7.2 all versions, 7.0 all versions and FortiOS version 7.6.2 and below, version 7.4.8 and below, 7.2 all versions, 7.0 all versions ZTNA proxy may allow an unauthenticated attacker in a man-in-the middle position to intercept and tamper with connections to the ZTNA proxy

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:11:26 UTC

Technical Analysis

CVE-2025-25253 is a vulnerability classified under CWE-297 (Improper Validation of Certificate with Host Mismatch) affecting Fortinet FortiProxy versions 7.6.1 and below, 7.4.8 and below, 7.2 all versions, 7.0 all versions, as well as FortiOS versions 7.6.2 and below, 7.4.8 and below, 7.2 all versions, and 7.0 all versions specifically in the Zero Trust Network Access (ZTNA) proxy component. The vulnerability allows an unauthenticated attacker who can position themselves as a man-in-the-middle to exploit improper certificate validation when the hostname in the certificate does not match the expected host. This flaw enables interception and tampering of traffic between clients and the ZTNA proxy, potentially exposing sensitive information and allowing modification of data in transit. The CVSS 3.1 vector indicates the attack requires adjacent network access (AV:A), high attack complexity (AC:H), no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). The exploitability is partially functional (E:P), with no official patch released yet (RL:X) and the report is confirmed (RC:R). No known exploits have been observed in the wild to date. The vulnerability affects a broad range of Fortinet's widely deployed security products used for secure remote access and network traffic inspection, especially in enterprise and service provider environments. The improper validation of certificates undermines the trust model of TLS connections, which is critical for secure communications in ZTNA architectures.

Potential Impact

The vulnerability poses a significant risk to organizations relying on Fortinet FortiProxy and FortiOS ZTNA proxies for secure remote access and traffic inspection. Successful exploitation can lead to full compromise of confidentiality, allowing attackers to eavesdrop on sensitive communications, steal credentials, or exfiltrate data. Integrity is also compromised as attackers can tamper with data in transit, potentially injecting malicious payloads or altering commands. Availability may be impacted if attackers disrupt or manipulate proxy connections. This undermines the security guarantees of Zero Trust Network Access implementations, potentially exposing internal resources to unauthorized access or data leakage. Given Fortinet's extensive market penetration in enterprise, government, and service provider sectors worldwide, the vulnerability could affect critical infrastructure, financial institutions, healthcare providers, and large enterprises. The medium CVSS score reflects the requirement for adjacent network access and high attack complexity, which somewhat limits the ease of exploitation but does not eliminate the threat. The absence of authentication requirements increases risk in environments where attackers can gain network proximity, such as compromised internal networks or public Wi-Fi.

Mitigation Recommendations

Organizations should monitor Fortinet advisories closely and apply security patches or updates as soon as they become available for FortiProxy and FortiOS ZTNA proxy components. In the interim, network segmentation should be enforced to limit access to ZTNA proxy interfaces, restricting them to trusted hosts and networks only. Deploy network intrusion detection and prevention systems (IDS/IPS) to detect anomalous man-in-the-middle activities or unusual TLS handshake failures. Enforce strict TLS configurations and certificate pinning where possible to reduce the risk of certificate validation bypass. Conduct regular audits of network traffic for signs of interception or tampering. Additionally, implement multi-factor authentication (MFA) and endpoint security measures to reduce the impact of potential credential theft. Organizations should also review and harden their Zero Trust policies and ensure that fallback mechanisms do not expose sensitive traffic. Finally, educate network administrators and security teams about the risks of certificate validation flaws and the importance of timely patch management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-02-05T13:31:18.867Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee6cbb1b3029e3c7e0402f

Added to database: 10/14/2025, 3:31:07 PM

Last enriched: 2/27/2026, 1:11:26 AM

Last updated: 3/22/2026, 5:01:37 AM

Views: 302

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses