Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53845: Improper access control in Fortinet FortiAnalyzer

0
Medium
VulnerabilityCVE-2025-53845cvecve-2025-53845
Published: Tue Oct 14 2025 (10/14/2025, 15:23:42 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiAnalyzer

Description

An improper authentication vulnerability [CWE-287] in Fortinet FortiAnalyzer version 7.6.0 through 7.6.3 and before 7.4.6 allows an unauthenticated attacker to obtain information pertaining to the device's health and status, or cause a denial of service via crafted OFTP requests.

AI-Powered Analysis

AILast updated: 01/14/2026, 14:47:50 UTC

Technical Analysis

CVE-2025-53845 is an improper access control vulnerability classified under CWE-287, affecting Fortinet FortiAnalyzer versions 7.6.0 through 7.6.3 and versions prior to 7.4.6. The flaw arises from insufficient authentication checks in the handling of OFTP (Open File Transfer Protocol) requests, which are used by FortiAnalyzer for device communication and log aggregation. An unauthenticated attacker can exploit this vulnerability remotely by sending specially crafted OFTP requests to the FortiAnalyzer device. Successful exploitation allows the attacker to retrieve sensitive information about the device's health and status, potentially exposing operational details that could aid further attacks. Additionally, the attacker can trigger a denial of service (DoS) condition, disrupting the availability of the FortiAnalyzer service. The vulnerability does not allow modification of data or system integrity compromise but impacts confidentiality and availability. The CVSS 3.1 score of 6.2 reflects a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). Exploitation scope is unchanged (S:U), with partial confidentiality impact (C:L), no integrity impact (I:N), and low availability impact (A:L). No known exploits have been reported in the wild as of the publication date. FortiAnalyzer is a critical component in many organizations' security infrastructure, used for centralized logging, analytics, and reporting, making this vulnerability a significant concern for operational security and incident response capabilities.

Potential Impact

For European organizations, the impact of CVE-2025-53845 can be substantial, particularly for those relying on FortiAnalyzer for centralized security monitoring and log management. Unauthorized access to device health and status information could provide attackers with insights into network topology, device configurations, and potential weaknesses, facilitating more targeted attacks. The ability to cause denial of service could disrupt security monitoring, delaying detection and response to other threats. This is especially critical for sectors with stringent regulatory requirements such as finance, healthcare, and critical infrastructure, where uninterrupted security operations are essential. The medium severity rating indicates that while the vulnerability is not catastrophic, it poses a meaningful risk that could degrade security posture and operational continuity. Given the lack of authentication required for exploitation, the attack surface is broad, increasing the likelihood of opportunistic attacks if unpatched. The absence of known exploits in the wild suggests a window of opportunity for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

European organizations should immediately assess their FortiAnalyzer deployments to identify affected versions (7.6.0 through 7.6.3 and versions before 7.4.6). Although no official patches are linked in the provided data, organizations should monitor Fortinet advisories closely and apply vendor-released patches or updates as soon as they become available. In the interim, network-level mitigations should be implemented: restrict access to FortiAnalyzer management interfaces and OFTP ports to trusted IP addresses only, ideally via firewall rules or network segmentation. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection for suspicious OFTP traffic patterns. Enable and review detailed logging on FortiAnalyzer to detect unusual access attempts or service disruptions. Consider disabling OFTP services if not required for operational needs. Conduct regular vulnerability scans and penetration tests focused on Fortinet devices to identify and remediate exposure. Finally, ensure incident response teams are aware of this vulnerability and prepared to respond to potential exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-07-10T08:53:33.015Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee702c75ce224a0426b90e

Added to database: 10/14/2025, 3:45:48 PM

Last enriched: 1/14/2026, 2:47:50 PM

Last updated: 1/19/2026, 9:56:37 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats