CVE-2025-46775: Information disclosure in Fortinet FortiExtender
A debug messages revealing unnecessary information vulnerability in Fortinet FortiExtender 7.6.0 through 7.6.1, FortiExtender 7.4.0 through 7.4.6, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated user to obtain administrator credentials via debug log commands.
AI Analysis
Technical Summary
CVE-2025-46775 is a medium severity information disclosure vulnerability affecting Fortinet FortiExtender devices from versions 7.0.0 up to 7.6.1. The flaw arises from debug messages that leak sensitive information, including administrator credentials, when debug log commands are executed by an authenticated user with low privileges. The vulnerability requires an attacker to have some level of authenticated access to the device but does not require user interaction beyond that. The debug logs expose unnecessary details that should not be accessible to non-administrative users, effectively allowing privilege escalation through credential disclosure. FortiExtender devices are commonly deployed to provide cellular WAN connectivity and act as extensions to Fortinet’s security fabric, often used in enterprise and critical infrastructure networks. The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, and high confidentiality impact with no integrity or availability impact. No public exploits have been reported yet, but the vulnerability poses a risk of credential theft that could enable further compromise of network infrastructure.
Potential Impact
For European organizations, the primary impact is the potential compromise of administrator credentials on FortiExtender devices, which can lead to unauthorized access to network management interfaces and potentially lateral movement within the network. This could undermine the confidentiality of sensitive network configurations and data routed through these devices. Since FortiExtender is used to provide cellular WAN connectivity, disruption or compromise could affect business continuity, especially for remote sites or critical infrastructure relying on cellular failover. The vulnerability does not directly affect availability or integrity but increases the risk of further attacks by exposing privileged credentials. Organizations in sectors such as telecommunications, energy, transportation, and government are particularly at risk due to their reliance on secure cellular connectivity and Fortinet products. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially from insider attackers or advanced persistent threats with authenticated access.
Mitigation Recommendations
1. Immediately restrict access to debug log commands and related diagnostic interfaces to only fully trusted administrators. 2. Implement strict role-based access control (RBAC) on FortiExtender devices to ensure that users with low privileges cannot execute debug commands. 3. Monitor device logs and network traffic for unusual or unauthorized use of debug commands or attempts to access sensitive information. 4. Apply vendor patches or firmware updates as soon as they become available to address this vulnerability. 5. Conduct regular audits of user accounts and permissions on FortiExtender devices to detect and remove unnecessary privileges. 6. Employ network segmentation to isolate FortiExtender management interfaces from general user networks, reducing the risk of unauthorized access. 7. Educate administrators and users about the risks of credential exposure and enforce strong authentication mechanisms. 8. Consider multi-factor authentication (MFA) for accessing device management interfaces to reduce the risk of credential misuse.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2025-46775: Information disclosure in Fortinet FortiExtender
Description
A debug messages revealing unnecessary information vulnerability in Fortinet FortiExtender 7.6.0 through 7.6.1, FortiExtender 7.4.0 through 7.4.6, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated user to obtain administrator credentials via debug log commands.
AI-Powered Analysis
Technical Analysis
CVE-2025-46775 is a medium severity information disclosure vulnerability affecting Fortinet FortiExtender devices from versions 7.0.0 up to 7.6.1. The flaw arises from debug messages that leak sensitive information, including administrator credentials, when debug log commands are executed by an authenticated user with low privileges. The vulnerability requires an attacker to have some level of authenticated access to the device but does not require user interaction beyond that. The debug logs expose unnecessary details that should not be accessible to non-administrative users, effectively allowing privilege escalation through credential disclosure. FortiExtender devices are commonly deployed to provide cellular WAN connectivity and act as extensions to Fortinet’s security fabric, often used in enterprise and critical infrastructure networks. The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, and high confidentiality impact with no integrity or availability impact. No public exploits have been reported yet, but the vulnerability poses a risk of credential theft that could enable further compromise of network infrastructure.
Potential Impact
For European organizations, the primary impact is the potential compromise of administrator credentials on FortiExtender devices, which can lead to unauthorized access to network management interfaces and potentially lateral movement within the network. This could undermine the confidentiality of sensitive network configurations and data routed through these devices. Since FortiExtender is used to provide cellular WAN connectivity, disruption or compromise could affect business continuity, especially for remote sites or critical infrastructure relying on cellular failover. The vulnerability does not directly affect availability or integrity but increases the risk of further attacks by exposing privileged credentials. Organizations in sectors such as telecommunications, energy, transportation, and government are particularly at risk due to their reliance on secure cellular connectivity and Fortinet products. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially from insider attackers or advanced persistent threats with authenticated access.
Mitigation Recommendations
1. Immediately restrict access to debug log commands and related diagnostic interfaces to only fully trusted administrators. 2. Implement strict role-based access control (RBAC) on FortiExtender devices to ensure that users with low privileges cannot execute debug commands. 3. Monitor device logs and network traffic for unusual or unauthorized use of debug commands or attempts to access sensitive information. 4. Apply vendor patches or firmware updates as soon as they become available to address this vulnerability. 5. Conduct regular audits of user accounts and permissions on FortiExtender devices to detect and remove unnecessary privileges. 6. Employ network segmentation to isolate FortiExtender management interfaces from general user networks, reducing the risk of unauthorized access. 7. Educate administrators and users about the risks of credential exposure and enforce strong authentication mechanisms. 8. Consider multi-factor authentication (MFA) for accessing device management interfaces to reduce the risk of credential misuse.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fortinet
- Date Reserved
- 2025-04-29T08:42:13.449Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691ca896209f2030fa0168f2
Added to database: 11/18/2025, 5:10:46 PM
Last enriched: 1/14/2026, 2:56:55 PM
Last updated: 2/7/2026, 6:33:42 PM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.