Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53845: Improper access control in Fortinet FortiAnalyzer

0
Medium
VulnerabilityCVE-2025-53845cvecve-2025-53845
Published: Tue Oct 14 2025 (10/14/2025, 15:23:42 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiAnalyzer

Description

An improper authentication vulnerability [CWE-287] in Fortinet FortiAnalyzer version 7.6.0 through 7.6.3 and before 7.4.6 allows an unauthenticated attacker to obtain information pertaining to the device's health and status, or cause a denial of service via crafted OFTP requests.

AI-Powered Analysis

AILast updated: 10/14/2025, 15:55:18 UTC

Technical Analysis

CVE-2025-53845 is a security vulnerability classified as improper authentication (CWE-287) found in Fortinet FortiAnalyzer versions 7.6.0 through 7.6.3 and versions prior to 7.4.6. FortiAnalyzer is a centralized logging and analytics platform used to monitor Fortinet security devices. The vulnerability allows an unauthenticated attacker to send specially crafted OFTP (Open File Transfer Protocol) requests to the FortiAnalyzer device. These crafted requests can either disclose sensitive information related to the device's health and operational status or cause a denial of service (DoS) condition, impacting the availability of the device. The vulnerability is exploitable remotely without any authentication or user interaction, increasing the risk profile. The CVSS v3.1 base score of 6.2 reflects a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality (limited information disclosure) and availability (potential DoS), but not integrity. No known exploits have been reported in the wild as of the publication date, but the potential for exploitation exists given the ease of attack. FortiAnalyzer devices are critical in security operations, aggregating logs and analytics for Fortinet firewalls and other security products, making their availability and confidentiality important for organizational security posture.

Potential Impact

For European organizations, the impact of CVE-2025-53845 can be significant, especially for those relying heavily on Fortinet FortiAnalyzer for security monitoring and incident response. Unauthorized disclosure of device health and status information could provide attackers with reconnaissance data useful for planning further attacks. A denial of service condition could disrupt security monitoring capabilities, delaying detection and response to other threats. This is particularly critical for sectors such as finance, energy, telecommunications, and government, where continuous security monitoring is essential. The medium severity rating suggests that while the vulnerability is not catastrophic, it could facilitate more severe attacks if combined with other vulnerabilities or threat vectors. The lack of authentication requirement means attackers can exploit this vulnerability remotely, increasing the risk of widespread scanning and exploitation attempts. Disruption of FortiAnalyzer services could also impact compliance with regulatory requirements for security monitoring and logging in European jurisdictions such as GDPR and NIS Directive.

Mitigation Recommendations

To mitigate CVE-2025-53845, European organizations should take the following specific actions: 1) Immediately restrict network access to FortiAnalyzer devices, limiting OFTP protocol exposure to trusted management networks only, ideally via firewall rules or network segmentation. 2) Monitor network traffic for unusual or malformed OFTP requests that could indicate exploitation attempts. 3) Apply vendor patches or updates as soon as Fortinet releases them for the affected FortiAnalyzer versions; if patches are not yet available, consider upgrading to unaffected versions or implementing temporary compensating controls. 4) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection capabilities tuned to detect crafted OFTP requests targeting FortiAnalyzer. 5) Conduct regular audits of FortiAnalyzer access logs to identify unauthorized access or anomalous activity. 6) Ensure that FortiAnalyzer devices are not directly exposed to the internet or untrusted networks. 7) Coordinate with Fortinet support and subscribe to security advisories for timely updates. These measures go beyond generic advice by focusing on protocol-specific restrictions, network-level controls, and proactive monitoring tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-07-10T08:53:33.015Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee702c75ce224a0426b90e

Added to database: 10/14/2025, 3:45:48 PM

Last enriched: 10/14/2025, 3:55:18 PM

Last updated: 10/16/2025, 2:40:40 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats