Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46776: Escalation of privilege in Fortinet FortiExtender

0
Medium
VulnerabilityCVE-2025-46776cvecve-2025-46776
Published: Tue Nov 18 2025 (11/18/2025, 17:01:17 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiExtender

Description

A buffer copy without checking size of input ('classic buffer overflow') vulnerability in Fortinet FortiExtender 7.6.0 through 7.6.1, FortiExtender 7.4.0 through 7.4.6, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated user to execute arbitrary code or commands via crafted CLI commands.

AI-Powered Analysis

AILast updated: 01/14/2026, 14:57:09 UTC

Technical Analysis

CVE-2025-46776 is a classic buffer overflow vulnerability identified in Fortinet's FortiExtender product, affecting versions 7.0.0 through 7.6.1. The flaw exists due to a buffer copy operation that does not properly validate the size of input data, enabling an authenticated user with high privileges to execute arbitrary code or commands by submitting specially crafted CLI commands. This vulnerability requires the attacker to have authenticated access with elevated privileges, which typically means administrative or equivalent rights on the device. The lack of user interaction requirement facilitates automated exploitation once access is gained. The vulnerability impacts the confidentiality, integrity, and availability of the affected system, as arbitrary code execution could lead to full system compromise, data leakage, or denial of service. The CVSS v3.1 base score is 6.3, reflecting medium severity, with attack vector local, attack complexity high, privileges required high, and no user interaction needed. No public exploits or active exploitation in the wild have been reported as of the publication date. Fortinet has not yet provided patches or mitigation instructions, so organizations must rely on access controls and monitoring until updates are available. FortiExtender is commonly used to extend network connectivity and provide 4G/5G WAN failover, often deployed in enterprise and critical infrastructure environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to network infrastructure stability and security. Successful exploitation could allow attackers with administrative access to execute arbitrary code, potentially leading to full device compromise, interception or manipulation of network traffic, and disruption of WAN connectivity. This could impact business continuity, especially for organizations relying on FortiExtender for critical network failover or remote connectivity. Confidential data traversing these devices could be exposed or altered, and attackers might pivot to other internal systems. Given the requirement for high privileges and local access, the threat is more relevant to insider threats or attackers who have already breached perimeter defenses. However, the critical nature of FortiExtender in network operations means any compromise could have cascading effects on availability and integrity of enterprise networks across Europe.

Mitigation Recommendations

1. Immediately restrict administrative access to FortiExtender devices to trusted personnel only, using strong authentication and network segmentation. 2. Monitor device logs and network traffic for unusual CLI command activity or signs of privilege escalation attempts. 3. Implement strict access controls and multi-factor authentication for all management interfaces. 4. Until patches are released, consider disabling or limiting CLI access where feasible. 5. Maintain up-to-date inventories of FortiExtender devices and versions deployed to prioritize patching once Fortinet releases updates. 6. Employ network intrusion detection systems to identify anomalous behavior indicative of exploitation attempts. 7. Conduct regular security audits and penetration tests focusing on administrative access controls and device configurations. 8. Educate administrators on the risks of executing untrusted commands and the importance of secure credential management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-04-29T08:42:13.449Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ca896209f2030fa0168f5

Added to database: 11/18/2025, 5:10:46 PM

Last enriched: 1/14/2026, 2:57:09 PM

Last updated: 2/7/2026, 7:58:57 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats