Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57823: Information disclosure in Fortinet FortiAuthenticator

0
Low
VulnerabilityCVE-2025-57823cvecve-2025-57823
Published: Tue Dec 09 2025 (12/09/2025, 17:18:45 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiAuthenticator

Description

A direct request ('forced browsing') vulnerability in Fortinet FortiAuthenticator 6.6.0 through 6.6.6, FortiAuthenticator 6.5 all versions, FortiAuthenticator 6.4 all versions, FortiAuthenticator 6.3 all versions may allow an authenticated attacker with at least sponsor permissions to read and download device logs via accessing specific endpoints

AI-Powered Analysis

AILast updated: 01/14/2026, 14:49:28 UTC

Technical Analysis

CVE-2025-57823 is a vulnerability identified in Fortinet's FortiAuthenticator product, specifically affecting versions 6.3.0 through 6.6.6. The flaw arises from a forced browsing issue, where an authenticated user with sponsor-level permissions can directly request and access device log files through specific endpoints without proper authorization checks. Sponsor permissions typically allow limited administrative capabilities, but this vulnerability escalates their ability to read sensitive log data, potentially exposing information about system operations, user activities, or security events. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). However, it requires the attacker to have authenticated access with sponsor privileges (PR:H), limiting the scope of exploitation. The impact is limited to confidentiality (C:L) with no effect on integrity or availability. No known exploits have been reported in the wild, and no patches were linked at the time of disclosure. FortiAuthenticator is widely deployed in enterprise environments for identity management and two-factor authentication, making the exposure of logs a concern for operational security and privacy. The vulnerability's CVSS score of 2.6 reflects its low severity but does not negate the importance of addressing it to prevent information leakage that could facilitate further attacks.

Potential Impact

For European organizations, the primary impact of CVE-2025-57823 is the potential unauthorized disclosure of sensitive log data within FortiAuthenticator devices. Logs may contain information about authentication attempts, user identities, system configurations, and security events, which could be leveraged by attackers for reconnaissance or to plan subsequent attacks. Although the vulnerability requires authenticated access with sponsor permissions, insider threats or compromised sponsor accounts could exploit this flaw. Exposure of logs could also violate data protection regulations such as GDPR if personal data is contained within logs. The impact on operational security is moderate, as attackers gaining insight into authentication systems could attempt privilege escalation or lateral movement. However, since the vulnerability does not affect system integrity or availability, direct disruption of services is unlikely. Organizations relying heavily on FortiAuthenticator for critical identity and access management functions should consider this vulnerability a risk to confidentiality and audit integrity.

Mitigation Recommendations

To mitigate CVE-2025-57823, European organizations should implement the following specific measures: 1) Restrict sponsor-level permissions strictly to trusted personnel and regularly review user roles to minimize the number of accounts with elevated access. 2) Monitor FortiAuthenticator access logs for unusual or unauthorized attempts to access log endpoints, focusing on sponsor accounts. 3) Employ network segmentation and access controls to limit administrative interface exposure to trusted networks and VPNs only. 4) Once Fortinet releases patches or updates addressing this vulnerability, prioritize timely deployment after testing in controlled environments. 5) Consider implementing multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. 6) Conduct regular security audits and penetration tests focusing on authentication systems to detect potential abuse of permissions. 7) If possible, disable or restrict access to log download endpoints for sponsor roles until patches are applied. These targeted actions go beyond generic advice by focusing on permission management, monitoring, and access control specific to FortiAuthenticator environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-08-20T16:29:11.184Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69385e4c74ebaa3baba14015

Added to database: 12/9/2025, 5:37:16 PM

Last enriched: 1/14/2026, 2:49:28 PM

Last updated: 2/7/2026, 11:05:22 AM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats