CVE-2025-54971: Information disclosure in Fortinet FortiADC
An exposure of sensitive information to an unauthorized actor vulnerability in Fortinet FortiADC 7.4.0, FortiADC 7.2 all versions, FortiADC 7.1 all versions, FortiADC 7.0 all versions, FortiADC 6.2 all versions may allow an admin with read-only permission to get the external resources password via the logs of the product
AI Analysis
Technical Summary
CVE-2025-54971 is a vulnerability identified in multiple versions of Fortinet's FortiADC product, specifically versions 6.2.0, 7.0.0, 7.1.0, 7.2.0, and 7.4.0. FortiADC is a network appliance used for application delivery and load balancing. The vulnerability arises because sensitive information, specifically passwords for external resources, is logged in a manner accessible to users with read-only administrative permissions. This means that an admin user who should only have limited visibility can extract these credentials by reviewing the product logs. The vulnerability is remotely exploitable without user interaction and requires low privileges (read-only admin access), which is a lower barrier than requiring full admin rights. The CVSS 3.1 base score is 3.9, reflecting a low severity primarily due to the limited scope of privilege required and the impact being limited to confidentiality. There is no impact on integrity or availability. The vulnerability was published on November 18, 2025, with no known exploits in the wild at this time. The issue stems from improper handling and exposure of sensitive data in logs, which is a common security oversight. Fortinet has not yet published patches or mitigation guidance, but organizations should monitor for updates and consider restricting read-only admin access until resolved.
Potential Impact
For European organizations, the primary impact of CVE-2025-54971 is the potential unauthorized disclosure of sensitive credentials used by FortiADC to access external resources. This could lead to lateral movement or escalation if an attacker gains read-only admin access to the FortiADC management interface. While the vulnerability itself does not allow direct system compromise or denial of service, the leaked passwords could be leveraged to access backend systems or services, increasing the risk of broader compromise. Sectors such as finance, telecommunications, and critical infrastructure that rely heavily on Fortinet products for secure application delivery are at higher risk. The exposure of credentials may also conflict with GDPR requirements around data protection and access controls, potentially leading to regulatory scrutiny if exploited. However, the low CVSS score and requirement for existing read-only admin access limit the immediate threat level. Nonetheless, organizations should treat this vulnerability seriously due to the sensitive nature of the leaked information and the potential for chained attacks.
Mitigation Recommendations
1. Immediately audit and restrict read-only admin permissions on FortiADC devices to only trusted personnel, minimizing the number of users who can access logs containing sensitive information. 2. Monitor access logs and management interface activity for unusual or unauthorized read-only admin access. 3. Until patches are released, consider disabling or limiting logging of sensitive external resource passwords if configurable. 4. Implement network segmentation and strict access controls around FortiADC management interfaces to reduce exposure. 5. Regularly rotate passwords for external resources accessed by FortiADC to limit the window of exposure. 6. Stay informed on Fortinet security advisories and apply patches promptly once available. 7. Conduct internal security awareness training to ensure administrators understand the sensitivity of log data and the importance of access controls. 8. Use multi-factor authentication (MFA) for all administrative access to FortiADC to reduce risk of credential compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-54971: Information disclosure in Fortinet FortiADC
Description
An exposure of sensitive information to an unauthorized actor vulnerability in Fortinet FortiADC 7.4.0, FortiADC 7.2 all versions, FortiADC 7.1 all versions, FortiADC 7.0 all versions, FortiADC 6.2 all versions may allow an admin with read-only permission to get the external resources password via the logs of the product
AI-Powered Analysis
Technical Analysis
CVE-2025-54971 is a vulnerability identified in multiple versions of Fortinet's FortiADC product, specifically versions 6.2.0, 7.0.0, 7.1.0, 7.2.0, and 7.4.0. FortiADC is a network appliance used for application delivery and load balancing. The vulnerability arises because sensitive information, specifically passwords for external resources, is logged in a manner accessible to users with read-only administrative permissions. This means that an admin user who should only have limited visibility can extract these credentials by reviewing the product logs. The vulnerability is remotely exploitable without user interaction and requires low privileges (read-only admin access), which is a lower barrier than requiring full admin rights. The CVSS 3.1 base score is 3.9, reflecting a low severity primarily due to the limited scope of privilege required and the impact being limited to confidentiality. There is no impact on integrity or availability. The vulnerability was published on November 18, 2025, with no known exploits in the wild at this time. The issue stems from improper handling and exposure of sensitive data in logs, which is a common security oversight. Fortinet has not yet published patches or mitigation guidance, but organizations should monitor for updates and consider restricting read-only admin access until resolved.
Potential Impact
For European organizations, the primary impact of CVE-2025-54971 is the potential unauthorized disclosure of sensitive credentials used by FortiADC to access external resources. This could lead to lateral movement or escalation if an attacker gains read-only admin access to the FortiADC management interface. While the vulnerability itself does not allow direct system compromise or denial of service, the leaked passwords could be leveraged to access backend systems or services, increasing the risk of broader compromise. Sectors such as finance, telecommunications, and critical infrastructure that rely heavily on Fortinet products for secure application delivery are at higher risk. The exposure of credentials may also conflict with GDPR requirements around data protection and access controls, potentially leading to regulatory scrutiny if exploited. However, the low CVSS score and requirement for existing read-only admin access limit the immediate threat level. Nonetheless, organizations should treat this vulnerability seriously due to the sensitive nature of the leaked information and the potential for chained attacks.
Mitigation Recommendations
1. Immediately audit and restrict read-only admin permissions on FortiADC devices to only trusted personnel, minimizing the number of users who can access logs containing sensitive information. 2. Monitor access logs and management interface activity for unusual or unauthorized read-only admin access. 3. Until patches are released, consider disabling or limiting logging of sensitive external resource passwords if configurable. 4. Implement network segmentation and strict access controls around FortiADC management interfaces to reduce exposure. 5. Regularly rotate passwords for external resources accessed by FortiADC to limit the window of exposure. 6. Stay informed on Fortinet security advisories and apply patches promptly once available. 7. Conduct internal security awareness training to ensure administrators understand the sensitivity of log data and the importance of access controls. 8. Use multi-factor authentication (MFA) for all administrative access to FortiADC to reduce risk of credential compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fortinet
- Date Reserved
- 2025-08-04T08:14:35.421Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691ca897209f2030fa01695e
Added to database: 11/18/2025, 5:10:47 PM
Last enriched: 11/18/2025, 5:22:07 PM
Last updated: 11/22/2025, 10:40:09 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13318: CWE-862 Missing Authorization in codepeople Booking Calendar Contact Form
MediumCVE-2025-13136: CWE-862 Missing Authorization in westerndeal GSheetConnector For Ninja Forms
MediumCVE-2025-13384: CWE-862 Missing Authorization in codepeople CP Contact Form with PayPal
HighCVE-2025-13317: CWE-862 Missing Authorization in codepeople Appointment Booking Calendar
MediumCVE-2025-12877: CWE-862 Missing Authorization in themeatelier IDonate – Blood Donation, Request And Donor Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.