CVE-2025-59921: Information disclosure in Fortinet FortiADC
An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in Fortinet FortiADC version 7.4.0, version 7.2.3 and below, version 7.1.4 and below, 7.0 all versions, 6.2 all versions may allow an authenticated attacker to obtain sensitive data via crafted HTTP or HTTPs requests.
AI Analysis
Technical Summary
CVE-2025-59921 is a medium-severity information disclosure vulnerability affecting multiple versions of Fortinet's FortiADC product, specifically versions 6.2.x, 7.0.x, 7.1.x, 7.2.x, and 7.4.0. FortiADC is a widely used application delivery controller that provides load balancing, SSL offloading, and web application firewall capabilities. The vulnerability arises from improper handling of crafted HTTP or HTTPS requests by the FortiADC management interface or API, allowing an attacker with authenticated access to retrieve sensitive information that should otherwise be protected. The flaw does not require user interaction but does require the attacker to have at least low-level authenticated privileges, which could be obtained via credential compromise or insider threat. The CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, and high confidentiality impact with no integrity or availability impact. Although no public exploits or active exploitation have been reported, the vulnerability poses a risk of sensitive data leakage such as configuration details, credentials, or session information that could facilitate further attacks or lateral movement within the network. Fortinet has not yet published patches or mitigation details, but organizations are advised to monitor for updates and restrict access to FortiADC management interfaces to trusted administrators only.
Potential Impact
For European organizations, the primary impact is the unauthorized disclosure of sensitive information from FortiADC devices, which may include administrative credentials, configuration files, or session tokens. This exposure can lead to further compromise of network infrastructure, unauthorized access to protected applications, or disruption of services through subsequent attacks. Sectors such as finance, telecommunications, government, and critical infrastructure that rely on FortiADC for secure application delivery are particularly at risk. The vulnerability could facilitate lateral movement within enterprise networks or provide attackers with intelligence to bypass security controls. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach can have severe operational and reputational consequences, including regulatory penalties under GDPR if personal data is exposed.
Mitigation Recommendations
1. Immediately restrict access to FortiADC management interfaces and APIs to trusted administrators via network segmentation, VPNs, or IP whitelisting. 2. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), for all FortiADC user accounts. 3. Monitor FortiADC logs and network traffic for unusual or unauthorized access attempts, especially crafted HTTP/HTTPS requests. 4. Apply vendor patches or updates as soon as they are released by Fortinet addressing CVE-2025-59921. 5. Conduct regular audits of FortiADC configurations and user accounts to detect and remove unnecessary privileges. 6. Implement strict credential management policies to prevent credential compromise that could enable authenticated access. 7. Consider deploying web application firewalls or intrusion detection systems to detect exploitation attempts targeting FortiADC. 8. Educate administrators on the risks of this vulnerability and best practices for secure device management.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-59921: Information disclosure in Fortinet FortiADC
Description
An exposure of sensitive information to an unauthorized actor vulnerability [CWE-200] in Fortinet FortiADC version 7.4.0, version 7.2.3 and below, version 7.1.4 and below, 7.0 all versions, 6.2 all versions may allow an authenticated attacker to obtain sensitive data via crafted HTTP or HTTPs requests.
AI-Powered Analysis
Technical Analysis
CVE-2025-59921 is a medium-severity information disclosure vulnerability affecting multiple versions of Fortinet's FortiADC product, specifically versions 6.2.x, 7.0.x, 7.1.x, 7.2.x, and 7.4.0. FortiADC is a widely used application delivery controller that provides load balancing, SSL offloading, and web application firewall capabilities. The vulnerability arises from improper handling of crafted HTTP or HTTPS requests by the FortiADC management interface or API, allowing an attacker with authenticated access to retrieve sensitive information that should otherwise be protected. The flaw does not require user interaction but does require the attacker to have at least low-level authenticated privileges, which could be obtained via credential compromise or insider threat. The CVSS v3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, and high confidentiality impact with no integrity or availability impact. Although no public exploits or active exploitation have been reported, the vulnerability poses a risk of sensitive data leakage such as configuration details, credentials, or session information that could facilitate further attacks or lateral movement within the network. Fortinet has not yet published patches or mitigation details, but organizations are advised to monitor for updates and restrict access to FortiADC management interfaces to trusted administrators only.
Potential Impact
For European organizations, the primary impact is the unauthorized disclosure of sensitive information from FortiADC devices, which may include administrative credentials, configuration files, or session tokens. This exposure can lead to further compromise of network infrastructure, unauthorized access to protected applications, or disruption of services through subsequent attacks. Sectors such as finance, telecommunications, government, and critical infrastructure that rely on FortiADC for secure application delivery are particularly at risk. The vulnerability could facilitate lateral movement within enterprise networks or provide attackers with intelligence to bypass security controls. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach can have severe operational and reputational consequences, including regulatory penalties under GDPR if personal data is exposed.
Mitigation Recommendations
1. Immediately restrict access to FortiADC management interfaces and APIs to trusted administrators via network segmentation, VPNs, or IP whitelisting. 2. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), for all FortiADC user accounts. 3. Monitor FortiADC logs and network traffic for unusual or unauthorized access attempts, especially crafted HTTP/HTTPS requests. 4. Apply vendor patches or updates as soon as they are released by Fortinet addressing CVE-2025-59921. 5. Conduct regular audits of FortiADC configurations and user accounts to detect and remove unnecessary privileges. 6. Implement strict credential management policies to prevent credential compromise that could enable authenticated access. 7. Consider deploying web application firewalls or intrusion detection systems to detect exploitation attempts targeting FortiADC. 8. Educate administrators on the risks of this vulnerability and best practices for secure device management.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- fortinet
- Date Reserved
- 2025-09-23T12:51:54.672Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee702c75ce224a0426b91d
Added to database: 10/14/2025, 3:45:48 PM
Last enriched: 1/14/2026, 3:03:27 PM
Last updated: 1/18/2026, 7:44:48 PM
Views: 265
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1126: Unrestricted Upload in lwj flow
MediumCVE-2026-1125: Command Injection in D-Link DIR-823X
MediumCVE-2026-1124: SQL Injection in Yonyou KSOA
MediumCVE-2026-0863: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
HighCVE-2026-1123: SQL Injection in Yonyou KSOA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.