Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59921: Information disclosure in Fortinet FortiADC

0
Medium
VulnerabilityCVE-2025-59921cvecve-2025-59921
Published: Tue Oct 14 2025 (10/14/2025, 15:23:42 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiADC

Description

An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in Fortinet FortiADC version 7.4.0, version 7.2.3 and below, version 7.1.4 and below, 7.0 all versions, 6.2 all versions may allow an authenticated attacker to obtain sensitive data via crafted HTTP or HTTPs requests.

AI-Powered Analysis

AILast updated: 01/14/2026, 15:03:27 UTC

Technical Analysis

CVE-2025-59921 is a medium-severity information disclosure vulnerability affecting multiple versions of Fortinet's FortiADC product, specifically versions 6.2.x, 7.0.x, 7.1.x, 7.2.x, and 7.4.0. FortiADC is a widely used application delivery controller that provides load balancing, SSL offloading, and web application firewall capabilities. The vulnerability arises from improper handling of crafted HTTP or HTTPS requests by the FortiADC management interface or API, allowing an attacker with authenticated access to retrieve sensitive information that should otherwise be protected. The flaw does not require user interaction but does require the attacker to have at least low-level authenticated privileges, which could be obtained via credential compromise or insider threat. The CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, and high confidentiality impact with no integrity or availability impact. Although no public exploits or active exploitation have been reported, the vulnerability poses a risk of sensitive data leakage such as configuration details, credentials, or session information that could facilitate further attacks or lateral movement within the network. Fortinet has not yet published patches or mitigation details, but organizations are advised to monitor for updates and restrict access to FortiADC management interfaces to trusted administrators only.

Potential Impact

For European organizations, the primary impact is the unauthorized disclosure of sensitive information from FortiADC devices, which may include administrative credentials, configuration files, or session tokens. This exposure can lead to further compromise of network infrastructure, unauthorized access to protected applications, or disruption of services through subsequent attacks. Sectors such as finance, telecommunications, government, and critical infrastructure that rely on FortiADC for secure application delivery are particularly at risk. The vulnerability could facilitate lateral movement within enterprise networks or provide attackers with intelligence to bypass security controls. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach can have severe operational and reputational consequences, including regulatory penalties under GDPR if personal data is exposed.

Mitigation Recommendations

1. Immediately restrict access to FortiADC management interfaces and APIs to trusted administrators via network segmentation, VPNs, or IP whitelisting. 2. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), for all FortiADC user accounts. 3. Monitor FortiADC logs and network traffic for unusual or unauthorized access attempts, especially crafted HTTP/HTTPS requests. 4. Apply vendor patches or updates as soon as they are released by Fortinet addressing CVE-2025-59921. 5. Conduct regular audits of FortiADC configurations and user accounts to detect and remove unnecessary privileges. 6. Implement strict credential management policies to prevent credential compromise that could enable authenticated access. 7. Consider deploying web application firewalls or intrusion detection systems to detect exploitation attempts targeting FortiADC. 8. Educate administrators on the risks of this vulnerability and best practices for secure device management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-09-23T12:51:54.672Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee702c75ce224a0426b91d

Added to database: 10/14/2025, 3:45:48 PM

Last enriched: 1/14/2026, 3:03:27 PM

Last updated: 1/18/2026, 7:44:48 PM

Views: 265

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats