Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61713: Information disclosure in Fortinet FortiPAM

0
Low
VulnerabilityCVE-2025-61713cvecve-2025-61713
Published: Tue Nov 18 2025 (11/18/2025, 17:01:18 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiPAM

Description

A Cleartext Storage of Sensitive Information in Memory vulnerability [CWE-316] in Fortinet FortiPAM 1.6.0, FortiPAM 1.5 all versions, FortiPAM 1.4 all versions, FortiPAM 1.3 all versions, FortiPAM 1.2 all versions, FortiPAM 1.1 all versions, FortiPAM 1.0 all versions may allow an authenticated attacker with read-write admin privileges to the CLI to obtain other administrators' credentials via diagnose commands.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 10:21:52 UTC

Technical Analysis

CVE-2025-61713 is a vulnerability affecting Fortinet FortiPAM versions 1.0.0 through 1.6.0, where sensitive administrator credentials are stored in cleartext in memory. This flaw arises from improper handling of sensitive data (classified under CWE-316: Cleartext Storage of Sensitive Information in Memory). An attacker must be an authenticated administrator with read-write privileges to the command-line interface (CLI) to exploit this vulnerability. By executing specific diagnose commands, the attacker can retrieve credentials of other administrators, compromising confidentiality. The vulnerability does not affect integrity or availability of the system. The CVSS 3.1 base score is 3.8 (low severity), reflecting the requirement for high privileges (PR:H), local access (AV:L), and user interaction (UI:R). No public exploits are currently known, and no patches have been linked yet. The vulnerability is significant in environments where multiple administrators manage privileged accounts, as it could lead to lateral privilege escalation or unauthorized access if credentials are exposed. FortiPAM is a privileged access management solution used to secure and manage administrative credentials, so any compromise of stored credentials undermines its core security function.

Potential Impact

For European organizations, the primary impact is the potential exposure of administrator credentials within FortiPAM deployments. This could lead to unauthorized access to critical systems if an attacker with administrative CLI access extracts other admins' credentials. Confidentiality breaches could facilitate lateral movement, privilege escalation, or further compromise of sensitive infrastructure. Since FortiPAM is used to manage privileged accounts, the compromise of these credentials could undermine overall security posture, especially in sectors like finance, government, and critical infrastructure. However, the impact is mitigated by the requirement for an attacker to already have high-level administrative access and local CLI interaction, limiting the attack surface. Organizations with multiple administrators and shared credential management are at higher risk. The absence of known exploits reduces immediate threat but does not eliminate risk, especially if attackers develop targeted methods. The vulnerability could also affect compliance with data protection regulations if credential exposure leads to broader data breaches.

Mitigation Recommendations

1. Restrict CLI access strictly to trusted administrators and enforce strong authentication mechanisms, including multi-factor authentication (MFA) where possible. 2. Implement role-based access controls (RBAC) to minimize the number of users with read-write admin privileges on FortiPAM. 3. Monitor and audit CLI commands and administrator activities to detect unusual or unauthorized diagnose command usage. 4. Segregate administrative duties to reduce risk of a single compromised admin account leading to widespread credential exposure. 5. Apply Fortinet security updates and patches promptly once available to address this vulnerability. 6. Consider encrypting sensitive data in memory if configurable or request Fortinet for secure handling improvements. 7. Conduct regular security assessments and penetration tests focusing on privileged access management systems. 8. Educate administrators on the risks of credential exposure and enforce secure credential management practices. 9. Limit network access to FortiPAM management interfaces to trusted networks and use VPNs or jump hosts for remote access. 10. Maintain an incident response plan that includes procedures for credential compromise scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-09-30T14:50:57.841Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ca899209f2030fa016988

Added to database: 11/18/2025, 5:10:49 PM

Last enriched: 2/10/2026, 10:21:52 AM

Last updated: 3/24/2026, 4:27:43 PM

Views: 120

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses