Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54971: Information disclosure in Fortinet FortiADC

0
Low
VulnerabilityCVE-2025-54971cvecve-2025-54971
Published: Tue Nov 18 2025 (11/18/2025, 17:01:17 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiADC

Description

An exposure of sensitive information to an unauthorized actor vulnerability in Fortinet FortiADC 7.4.0, FortiADC 7.2 all versions, FortiADC 7.1 all versions, FortiADC 7.0 all versions, FortiADC 6.2 all versions may allow an admin with read-only permission to get the external resources password via the logs of the product

AI-Powered Analysis

AILast updated: 11/18/2025, 17:22:07 UTC

Technical Analysis

CVE-2025-54971 is a vulnerability identified in multiple versions of Fortinet's FortiADC product, specifically versions 6.2.0, 7.0.0, 7.1.0, 7.2.0, and 7.4.0. FortiADC is a network appliance used for application delivery and load balancing. The vulnerability arises because sensitive information, specifically passwords for external resources, is logged in a manner accessible to users with read-only administrative permissions. This means that an admin user who should only have limited visibility can extract these credentials by reviewing the product logs. The vulnerability is remotely exploitable without user interaction and requires low privileges (read-only admin access), which is a lower barrier than requiring full admin rights. The CVSS 3.1 base score is 3.9, reflecting a low severity primarily due to the limited scope of privilege required and the impact being limited to confidentiality. There is no impact on integrity or availability. The vulnerability was published on November 18, 2025, with no known exploits in the wild at this time. The issue stems from improper handling and exposure of sensitive data in logs, which is a common security oversight. Fortinet has not yet published patches or mitigation guidance, but organizations should monitor for updates and consider restricting read-only admin access until resolved.

Potential Impact

For European organizations, the primary impact of CVE-2025-54971 is the potential unauthorized disclosure of sensitive credentials used by FortiADC to access external resources. This could lead to lateral movement or escalation if an attacker gains read-only admin access to the FortiADC management interface. While the vulnerability itself does not allow direct system compromise or denial of service, the leaked passwords could be leveraged to access backend systems or services, increasing the risk of broader compromise. Sectors such as finance, telecommunications, and critical infrastructure that rely heavily on Fortinet products for secure application delivery are at higher risk. The exposure of credentials may also conflict with GDPR requirements around data protection and access controls, potentially leading to regulatory scrutiny if exploited. However, the low CVSS score and requirement for existing read-only admin access limit the immediate threat level. Nonetheless, organizations should treat this vulnerability seriously due to the sensitive nature of the leaked information and the potential for chained attacks.

Mitigation Recommendations

1. Immediately audit and restrict read-only admin permissions on FortiADC devices to only trusted personnel, minimizing the number of users who can access logs containing sensitive information. 2. Monitor access logs and management interface activity for unusual or unauthorized read-only admin access. 3. Until patches are released, consider disabling or limiting logging of sensitive external resource passwords if configurable. 4. Implement network segmentation and strict access controls around FortiADC management interfaces to reduce exposure. 5. Regularly rotate passwords for external resources accessed by FortiADC to limit the window of exposure. 6. Stay informed on Fortinet security advisories and apply patches promptly once available. 7. Conduct internal security awareness training to ensure administrators understand the sensitivity of log data and the importance of access controls. 8. Use multi-factor authentication (MFA) for all administrative access to FortiADC to reduce risk of credential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-08-04T08:14:35.421Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ca897209f2030fa01695e

Added to database: 11/18/2025, 5:10:47 PM

Last enriched: 11/18/2025, 5:22:07 PM

Last updated: 11/22/2025, 10:40:09 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats