Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54971: Information disclosure in Fortinet FortiADC

0
Low
VulnerabilityCVE-2025-54971cvecve-2025-54971
Published: Tue Nov 18 2025 (11/18/2025, 17:01:17 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiADC

Description

An exposure of sensitive information to an unauthorized actor vulnerability in Fortinet FortiADC 7.4.0, FortiADC 7.2 all versions, FortiADC 7.1 all versions, FortiADC 7.0 all versions, FortiADC 6.2 all versions may allow an admin with read-only permission to get the external resources password via the logs of the product

AI-Powered Analysis

AILast updated: 11/25/2025, 18:12:17 UTC

Technical Analysis

CVE-2025-54971 is a vulnerability affecting multiple versions of Fortinet's FortiADC product, specifically versions 6.2.0, 7.0.0, 7.1.0, 7.2.0, and 7.4.0. The flaw arises from the way FortiADC logs sensitive information related to external resource passwords, which can be accessed by an administrator account with read-only permissions. This means that even administrators who are not granted full privileges can retrieve sensitive credentials from logs, potentially exposing them to unauthorized disclosure. The vulnerability is remotely exploitable without user interaction and requires low attack complexity, but it does require at least read-only admin privileges, limiting the scope of exploitation to insiders or compromised accounts with such access. The CVSS 3.1 base score is 3.9, reflecting a low severity primarily due to the limited impact on confidentiality and the requirement for some level of privilege. The vulnerability does not affect integrity or availability directly. No public exploits or active exploitation campaigns have been reported to date. FortiADC is commonly used for application delivery and load balancing, often in enterprise and service provider environments, making the exposure of credentials a concern for lateral movement or further compromise within networks. The vulnerability highlights the importance of strict access controls and secure logging practices.

Potential Impact

For European organizations, the impact of CVE-2025-54971 centers on the potential exposure of sensitive external resource passwords to users with read-only administrative access. While the vulnerability does not allow direct system compromise or denial of service, the leaked credentials could be used to access other critical systems or services, leading to potential lateral movement or escalation of privileges within the network. This risk is particularly relevant for organizations that rely on FortiADC for secure application delivery and traffic management, including financial institutions, government agencies, and critical infrastructure operators. The exposure could undermine confidentiality and trust in network security controls. However, since exploitation requires at least read-only admin privileges, the threat is mitigated by strong internal access management and monitoring. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance. Organizations with complex multi-tenant environments or third-party administrators should be especially cautious, as the vulnerability could be exploited by insiders or compromised accounts to harvest credentials silently.

Mitigation Recommendations

To mitigate CVE-2025-54971, European organizations should implement the following specific measures: 1) Restrict read-only administrative access strictly to trusted personnel and regularly audit these accounts for necessity and activity. 2) Review and sanitize FortiADC logs to ensure sensitive credentials are not stored or accessible; consider configuring logging to exclude sensitive information if possible. 3) Monitor logs and access patterns for unusual read-only admin activity that could indicate attempts to extract sensitive data. 4) Apply vendor patches or updates as soon as they become available to address the vulnerability directly. 5) Employ network segmentation to limit the exposure of FortiADC management interfaces to trusted networks only. 6) Use multi-factor authentication (MFA) for all administrative access to reduce the risk of compromised credentials being used to exploit this vulnerability. 7) Conduct internal security awareness training to highlight the risks of credential exposure and the importance of safeguarding administrative accounts. 8) If feasible, rotate external resource passwords regularly to limit the window of exposure in case of credential leakage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-08-04T08:14:35.421Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ca897209f2030fa01695e

Added to database: 11/18/2025, 5:10:47 PM

Last enriched: 11/25/2025, 6:12:17 PM

Last updated: 1/7/2026, 6:08:49 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats