Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57740: Execute unauthorized code or commands in Fortinet FortiPAM

0
Medium
VulnerabilityCVE-2025-57740cvecve-2025-57740
Published: Tue Oct 14 2025 (10/14/2025, 15:22:54 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiPAM

Description

An Heap-based Buffer Overflow vulnerability [CWE-122] in FortiOS version 7.6.2 and below, version 7.4.7 and below, version 7.2.10 and below, 7.0 all versions, 6.4 all versions; FortiPAM version 1.5.0, version 1.4.2 and below, 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions and FortiProxy version 7.6.2 and below, version 7.4.3 and below, 7.2 all versions, 7.0 all versions RDP bookmark connection may allow an authenticated user to execute unauthorized code via crafted requests.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 03:51:56 UTC

Technical Analysis

CVE-2025-57740 is a heap-based buffer overflow vulnerability (CWE-122) identified in Fortinet's FortiPAM, FortiOS, and FortiProxy products across multiple versions, including FortiPAM versions 1.0.0 through 1.5.0, FortiOS versions 6.4 through 7.6.2, and FortiProxy versions 7.0 through 7.6.2. The flaw arises in the handling of RDP bookmark connections, where an authenticated user with low privileges (PR:L) can send crafted requests that overflow a heap buffer, enabling execution of unauthorized code or commands. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N), but the attack complexity is high (AC:H), meaning exploitation requires detailed knowledge and precise conditions. The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H), allowing attackers to potentially take full control of affected systems. The CVSS 3.1 score is 6.7, reflecting medium severity. No public exploits or active exploitation in the wild have been reported as of the publication date (October 14, 2025). The vulnerability affects critical Fortinet products widely used for privileged access management and network security, making it a significant concern for organizations relying on these solutions.

Potential Impact

The vulnerability allows an authenticated user with low privileges to execute arbitrary code, which can lead to full system compromise. This threatens the confidentiality of sensitive data managed by FortiPAM and FortiOS, including privileged credentials and network configurations. Integrity can be compromised by unauthorized changes to system settings or security policies. Availability may be disrupted by system crashes or denial of service caused by the buffer overflow. Organizations using affected Fortinet products in critical infrastructure, financial services, government, and large enterprises face elevated risks of data breaches, operational disruption, and lateral movement by attackers. The requirement for authentication limits exposure but insider threats or compromised accounts could exploit this flaw. The absence of known exploits reduces immediate risk but also means organizations should proactively patch to prevent future attacks.

Mitigation Recommendations

1. Apply vendor patches and updates as soon as they become available for FortiPAM, FortiOS, and FortiProxy to remediate the vulnerability. 2. Restrict access to Fortinet management interfaces to trusted administrators only, using network segmentation and VPNs. 3. Enforce strong authentication mechanisms and monitor for unusual login activity to detect potential misuse of credentials. 4. Implement strict role-based access controls to limit the number of users with privileges to interact with RDP bookmark features. 5. Conduct regular security audits and vulnerability scans focusing on Fortinet products to identify unpatched systems. 6. Monitor network traffic for anomalous requests targeting RDP bookmark connections or unusual command execution patterns. 7. Employ endpoint detection and response (EDR) tools to identify exploitation attempts or post-exploitation activity. 8. Prepare incident response plans specifically addressing potential exploitation of Fortinet vulnerabilities to enable rapid containment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-08-19T12:04:48.437Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee6cbb1b3029e3c7e0403b

Added to database: 10/14/2025, 3:31:07 PM

Last enriched: 2/27/2026, 3:51:56 AM

Last updated: 3/24/2026, 7:16:42 AM

Views: 287

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses