Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59808: Improper access control in Fortinet FortiSOAR on-premise

0
Medium
VulnerabilityCVE-2025-59808cvecve-2025-59808
Published: Tue Dec 09 2025 (12/09/2025, 17:19:06 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiSOAR on-premise

Description

An unverified password change vulnerability [CWE-620] vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.2, FortiSOAR PaaS 7.5.0 through 7.5.1, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.2, FortiSOAR on-premise 7.5.0 through 7.5.1, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow an attacker who has already gained access to a victim's user account to reset the account credentials without being prompted for the account's password

AI-Powered Analysis

AILast updated: 01/14/2026, 15:03:12 UTC

Technical Analysis

CVE-2025-59808 is an improper access control vulnerability identified in Fortinet FortiSOAR on-premise and PaaS versions 7.3.0 through 7.6.2. The flaw allows an attacker who has already gained access to a victim’s user account to reset the account’s password without providing the current password, violating standard authentication controls (CWE-620). This vulnerability arises from insufficient verification during the password change process, enabling unauthorized credential modification. The attacker requires low privileges (PR:L) and network access (AV:N) but does not require user interaction (UI:N). The vulnerability affects the integrity and availability of the system by allowing attackers to escalate privileges or lock out legitimate users, potentially disrupting security operations managed through FortiSOAR. The CVSS v3.1 score of 6.5 reflects medium severity, with high impact on integrity and availability, and exploitation complexity rated as high due to the prerequisite of existing account access. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. FortiSOAR is widely used for security orchestration, automation, and response (SOAR), making this vulnerability critical in environments relying on automated incident response workflows.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized account takeovers within FortiSOAR platforms, undermining the integrity of automated security operations and incident response processes. Attackers exploiting this flaw could disrupt security workflows, disable or manipulate automated responses, and potentially gain further access to connected security tools and data. This could result in delayed detection and response to cyber incidents, increasing the risk of data breaches or operational disruptions. Organizations in critical infrastructure sectors such as finance, energy, and government, which heavily rely on FortiSOAR for security automation, face heightened risks. The vulnerability could also facilitate lateral movement within networks if attackers leverage compromised FortiSOAR accounts to escalate privileges or pivot to other systems. The medium severity rating indicates a significant but not immediately critical threat, emphasizing the need for timely remediation to avoid operational impact.

Mitigation Recommendations

Organizations should immediately verify their FortiSOAR version and plan to upgrade to a patched release once available from Fortinet. In the absence of patches, implement strict access controls and monitor user account activities closely, especially password change events. Enforce multi-factor authentication (MFA) on all FortiSOAR accounts to reduce the risk of account compromise. Limit user privileges to the minimum necessary to reduce the impact of compromised accounts. Conduct regular audits of user accounts and password policies to detect anomalies. Network segmentation should be applied to restrict access to FortiSOAR management interfaces only to trusted administrators. Employ logging and alerting on suspicious password reset attempts or unusual account behavior. Additionally, consider integrating FortiSOAR with external identity providers that enforce stronger authentication and password management policies. Finally, maintain an incident response plan that includes procedures for rapid account recovery and forensic analysis in case of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-09-22T08:19:21.055Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69385e4c74ebaa3baba1401e

Added to database: 12/9/2025, 5:37:16 PM

Last enriched: 1/14/2026, 3:03:12 PM

Last updated: 2/4/2026, 10:14:38 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats