Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47295: Denial of service in Fortinet FortiOS

0
Low
VulnerabilityCVE-2025-47295cvecve-2025-47295
Published: Wed May 28 2025 (05/28/2025, 07:54:05 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

A buffer over-read in Fortinet FortiOS versions 7.4.0 through 7.4.3, versions 7.2.0 through 7.2.7, and versions 7.0.0 through 7.0.14 may allow a remote unauthenticated attacker to crash the FGFM daemon via a specially crafted request, under rare conditions that are outside of the attacker's control.

AI-Powered Analysis

AILast updated: 07/06/2025, 01:13:01 UTC

Technical Analysis

CVE-2025-47295 is a buffer over-read vulnerability identified in Fortinet's FortiOS operating system, specifically affecting versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, and 6.4.0. The vulnerability resides in the FGFM (FortiGate to FortiManager) daemon, which is responsible for communication between FortiGate devices and FortiManager management servers. A remote unauthenticated attacker can send a specially crafted request that triggers a buffer over-read condition, leading to a denial of service (DoS) by crashing the FGFM daemon. The conditions required to exploit this vulnerability are rare and outside the attacker's control, which reduces the likelihood of successful exploitation. The vulnerability does not allow for confidentiality or integrity compromise, nor does it provide a means for code execution or privilege escalation. The CVSS v3.1 base score is 3.4, indicating a low severity level, with attack vector being network-based but requiring high attack complexity and no privileges or user interaction. There are no known exploits in the wild at the time of publication, and no patches or mitigations have been explicitly linked in the provided data. This vulnerability primarily impacts availability by causing service disruption on affected FortiOS devices, potentially interrupting network security management and monitoring functions.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to availability disruptions in network security infrastructure. FortiOS is widely used in enterprise and service provider environments for firewalling, VPN, and centralized management via FortiManager. A denial of service on the FGFM daemon could disrupt communication between FortiGate devices and FortiManager, impairing centralized management, logging, and policy deployment. This could delay incident response and security operations, especially in large-scale deployments. However, since exploitation requires rare conditions and does not allow for data compromise or persistent control, the overall risk to confidentiality and integrity is minimal. Organizations relying heavily on Fortinet infrastructure for critical network security may experience temporary outages or degraded security posture during an attack or attempted exploitation. The low CVSS score reflects the limited impact and complexity of exploitation, but organizations should remain vigilant given the critical role of FortiOS in network defense.

Mitigation Recommendations

1. Monitor Fortinet advisories closely for official patches or updates addressing CVE-2025-47295 and apply them promptly once available. 2. Implement network segmentation to limit exposure of FortiOS management interfaces, especially the FGFM daemon, to untrusted networks or the internet. 3. Restrict access to FortiManager and FortiGate management interfaces via firewall rules and VPNs to trusted administrators only. 4. Enable and monitor logging and alerting for unusual FGFM daemon crashes or restarts to detect potential exploitation attempts early. 5. Conduct regular backups of FortiOS configurations and FortiManager data to enable rapid recovery in case of service disruption. 6. Consider deploying redundancy or high availability configurations for FortiManager and FortiGate devices to minimize impact of potential DoS events. 7. Review and harden FortiOS configurations to minimize attack surface, including disabling unused services and interfaces. These steps go beyond generic advice by focusing on limiting attack surface, early detection, and operational resilience specific to FortiOS and FGFM daemon.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-05-05T20:10:32.083Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6836c26c182aa0cae23d6c48

Added to database: 5/28/2025, 7:59:40 AM

Last enriched: 7/6/2025, 1:13:01 AM

Last updated: 11/21/2025, 3:55:16 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats