Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46775: Information disclosure in Fortinet FortiExtender

0
Medium
VulnerabilityCVE-2025-46775cvecve-2025-46775
Published: Tue Nov 18 2025 (11/18/2025, 17:01:17 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiExtender

Description

A debug messages revealing unnecessary information vulnerability in Fortinet FortiExtender 7.6.0 through 7.6.1, FortiExtender 7.4.0 through 7.4.6, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated user to obtain administrator credentials via debug log commands.

AI-Powered Analysis

AILast updated: 01/14/2026, 14:56:55 UTC

Technical Analysis

CVE-2025-46775 is a medium severity information disclosure vulnerability affecting Fortinet FortiExtender devices from versions 7.0.0 up to 7.6.1. The flaw arises from debug messages that leak sensitive information, including administrator credentials, when debug log commands are executed by an authenticated user with low privileges. The vulnerability requires an attacker to have some level of authenticated access to the device but does not require user interaction beyond that. The debug logs expose unnecessary details that should not be accessible to non-administrative users, effectively allowing privilege escalation through credential disclosure. FortiExtender devices are commonly deployed to provide cellular WAN connectivity and act as extensions to Fortinet’s security fabric, often used in enterprise and critical infrastructure networks. The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, and high confidentiality impact with no integrity or availability impact. No public exploits have been reported yet, but the vulnerability poses a risk of credential theft that could enable further compromise of network infrastructure.

Potential Impact

For European organizations, the primary impact is the potential compromise of administrator credentials on FortiExtender devices, which can lead to unauthorized access to network management interfaces and potentially lateral movement within the network. This could undermine the confidentiality of sensitive network configurations and data routed through these devices. Since FortiExtender is used to provide cellular WAN connectivity, disruption or compromise could affect business continuity, especially for remote sites or critical infrastructure relying on cellular failover. The vulnerability does not directly affect availability or integrity but increases the risk of further attacks by exposing privileged credentials. Organizations in sectors such as telecommunications, energy, transportation, and government are particularly at risk due to their reliance on secure cellular connectivity and Fortinet products. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially from insider attackers or advanced persistent threats with authenticated access.

Mitigation Recommendations

1. Immediately restrict access to debug log commands and related diagnostic interfaces to only fully trusted administrators. 2. Implement strict role-based access control (RBAC) on FortiExtender devices to ensure that users with low privileges cannot execute debug commands. 3. Monitor device logs and network traffic for unusual or unauthorized use of debug commands or attempts to access sensitive information. 4. Apply vendor patches or firmware updates as soon as they become available to address this vulnerability. 5. Conduct regular audits of user accounts and permissions on FortiExtender devices to detect and remove unnecessary privileges. 6. Employ network segmentation to isolate FortiExtender management interfaces from general user networks, reducing the risk of unauthorized access. 7. Educate administrators and users about the risks of credential exposure and enforce strong authentication mechanisms. 8. Consider multi-factor authentication (MFA) for accessing device management interfaces to reduce the risk of credential misuse.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-04-29T08:42:13.449Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ca896209f2030fa0168f2

Added to database: 11/18/2025, 5:10:46 PM

Last enriched: 1/14/2026, 2:56:55 PM

Last updated: 2/7/2026, 6:33:42 PM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats