Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59669: Improper access control in Fortinet FortiWeb

0
Medium
VulnerabilityCVE-2025-59669cvecve-2025-59669
Published: Tue Nov 18 2025 (11/18/2025, 17:01:19 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiWeb

Description

A use of hard-coded credentials vulnerability in Fortinet FortiWeb 7.6.0, FortiWeb 7.4 all versions, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions may allow an authenticated attacker with shell access to the device to connect to redis service and access its data

AI-Powered Analysis

AILast updated: 01/14/2026, 14:49:44 UTC

Technical Analysis

CVE-2025-59669 is an improper access control vulnerability identified in multiple versions of Fortinet's FortiWeb product (7.0.0, 7.2.0, 7.4.0, and 7.6.0). The root cause is the use of hard-coded credentials that allow an authenticated attacker who already has shell access to the FortiWeb device to connect to the embedded Redis service. Redis is an in-memory data structure store used internally by FortiWeb for caching or session management. By leveraging these hard-coded credentials, the attacker can access Redis data, potentially exposing sensitive information or manipulating data to disrupt device operation. The vulnerability requires the attacker to have local shell access with some privileges, which means initial compromise or insider threat is a prerequisite. The CVSS v3.1 score is 4.8 (medium), reflecting the limited attack vector (local), low complexity, and partial impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the presence of hard-coded credentials represents a significant security design flaw. Fortinet has not yet published patches, so mitigation currently relies on access restrictions and monitoring. This vulnerability highlights the risks of embedded services with weak authentication controls in security appliances.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access to sensitive data stored in the Redis service on FortiWeb devices, potentially exposing web application firewall configurations, cached credentials, or session data. This could facilitate further attacks such as privilege escalation, data exfiltration, or disruption of web application protections. Since FortiWeb is widely used by enterprises, government agencies, and critical infrastructure providers in Europe, exploitation could impact confidentiality, integrity, and availability of protected web applications. The requirement for authenticated shell access limits remote exploitation but insider threats or attackers who have already compromised the device could leverage this vulnerability to deepen their foothold. Disruption or manipulation of Redis data could degrade FortiWeb functionality, leading to denial of service or bypass of security controls. The medium severity rating suggests moderate risk but should not be underestimated in high-security environments.

Mitigation Recommendations

1. Immediately restrict shell access to FortiWeb devices to trusted administrators only, using strong authentication and network segmentation. 2. Monitor Redis service connections and logs for unusual or unauthorized access attempts. 3. Disable or restrict the Redis service if it is not essential for operations. 4. Implement strict role-based access controls on FortiWeb devices to minimize the number of users with shell access. 5. Apply network-level controls such as firewall rules to limit access to Redis ports internally. 6. Regularly audit device configurations and credentials to detect hard-coded or default credentials. 7. Stay alert for official patches or advisories from Fortinet and apply them promptly once available. 8. Conduct internal penetration testing and vulnerability assessments focusing on FortiWeb devices to identify potential exploitation paths. 9. Educate administrators about the risks of this vulnerability and enforce best practices for device management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-09-18T15:35:02.492Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ca899209f2030fa016985

Added to database: 11/18/2025, 5:10:49 PM

Last enriched: 1/14/2026, 2:49:44 PM

Last updated: 2/6/2026, 5:29:43 AM

Views: 127

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats