Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31514: Information disclosure in Fortinet FortiProxy

0
Low
VulnerabilityCVE-2025-31514cvecve-2025-31514
Published: Tue Oct 14 2025 (10/14/2025, 15:23:52 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiProxy

Description

An Insertion of Sensitive Information into Log File vulnerability [CWE-532] in FortiOS 7.6.0 through 7.6.3, 7.4 all versions, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an attacker with at least read-only privileges to retrieve sensitive 2FA-related information via observing logs or via diagnose command.

AI-Powered Analysis

AILast updated: 01/14/2026, 14:55:48 UTC

Technical Analysis

CVE-2025-31514 is a vulnerability classified as CWE-532 (Insertion of Sensitive Information into Log File) affecting Fortinet FortiProxy products running FortiOS versions 6.4.x, 7.0.x, 7.2.x, 7.4.x, and 7.6.0 through 7.6.3. The flaw allows an attacker who has at least read-only privileges on the FortiProxy device to retrieve sensitive information related to two-factor authentication (2FA) by inspecting log files or executing diagnostic commands. This vulnerability stems from improper handling of sensitive data, which is inadvertently logged in plaintext or accessible logs, thereby exposing 2FA secrets or tokens. The attacker does not require user interaction but does need some level of authenticated access, which limits the attack surface to insiders or users with limited privileges. The CVSS v3.1 score is 2.6, reflecting low severity due to the requirement of privileges and the limited scope of impact (confidentiality only, no integrity or availability impact). No public exploits or widespread attacks have been reported to date. Fortinet has not yet published patches or mitigation details, but the issue is recognized and documented. This vulnerability could facilitate further attacks if combined with credential compromise or privilege escalation, as exposure of 2FA information weakens multi-factor authentication protections.

Potential Impact

For European organizations, the primary impact is the potential compromise of 2FA secrets, which undermines the security of authentication processes protecting critical systems. This could lead to unauthorized access if attackers leverage the disclosed information alongside other credentials. While the vulnerability requires read-only access, insider threats or compromised low-privilege accounts could exploit this to escalate attacks. Organizations relying on FortiProxy for secure web gateway or proxy services, especially in sectors like finance, government, and critical infrastructure, may face increased risk of credential theft and subsequent breaches. The confidentiality breach could erode trust in multi-factor authentication deployments and complicate incident response. However, since the vulnerability does not affect system integrity or availability, direct service disruption is unlikely. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately audit and restrict read-only access to FortiProxy logs and diagnostic commands, ensuring only trusted administrators have such privileges. Implement strict role-based access controls (RBAC) and monitor access logs for unusual activity. Until patches are available, consider disabling or limiting diagnostic commands that expose sensitive 2FA information. Regularly review and sanitize logs to remove sensitive data where feasible. Employ network segmentation to isolate FortiProxy management interfaces from general user access. Enhance monitoring for insider threats and anomalous access patterns. When Fortinet releases patches or updates addressing this issue, prioritize their deployment in all affected environments. Additionally, reinforce multi-factor authentication mechanisms by using hardware tokens or out-of-band verification methods less susceptible to information leakage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-03-31T09:51:06.253Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee702b75ce224a0426b559

Added to database: 10/14/2025, 3:45:47 PM

Last enriched: 1/14/2026, 2:55:48 PM

Last updated: 1/19/2026, 7:47:19 AM

Views: 257

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats