Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62439: Improper access control in Fortinet FortiOS

0
Low
VulnerabilityCVE-2025-62439cvecve-2025-62439
Published: Tue Feb 10 2026 (02/10/2026, 15:39:12 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

CVE-2025-62439 is an improper access control vulnerability in Fortinet FortiOS versions 7. 0. 0 through 7. 6. 4. It allows an authenticated user with knowledge of Fortinet Single Sign-On (FSSO) policy configurations to gain unauthorized access to protected network resources by sending crafted requests. The vulnerability requires low privileges and no user interaction but has a high attack complexity. It impacts confidentiality and integrity but not availability, with a CVSS score of 3. 8 (low severity). No known exploits are currently reported in the wild.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 15:18:25 UTC

Technical Analysis

CVE-2025-62439 is a vulnerability identified in multiple versions of Fortinet's FortiOS, specifically versions 7.0.0 through 7.6.4. The root cause is improper verification of the source of a communication channel (CWE-940), which leads to improper access control. This flaw allows an authenticated user who has knowledge of Fortinet Single Sign-On (FSSO) policy configurations to craft specific requests that bypass intended access restrictions and gain unauthorized access to protected network resources. The vulnerability requires the attacker to have low privileges (authenticated user) but the attack complexity is high, meaning the attacker must understand FSSO configurations and craft precise requests. The vulnerability impacts confidentiality and integrity by allowing unauthorized data access and potential modification but does not affect system availability. The CVSS 3.1 base score is 3.8, reflecting a low severity rating due to the need for authentication, high attack complexity, and limited impact scope. No public exploits or active exploitation have been reported to date. FortiOS is widely used in enterprise and critical infrastructure environments for network security, making this vulnerability relevant for organizations relying on Fortinet products for perimeter defense and internal segmentation.

Potential Impact

For European organizations, the impact of CVE-2025-62439 could include unauthorized access to sensitive internal network segments protected by FortiOS firewalls, potentially exposing confidential data or allowing lateral movement within the network. While the vulnerability does not allow unauthenticated remote exploitation, the requirement for an authenticated user with knowledge of FSSO policies means insider threats or compromised low-privilege accounts could leverage this flaw. This could undermine network segmentation and access control policies, increasing the risk of data breaches or unauthorized data manipulation. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, could face compliance and reputational risks if this vulnerability is exploited. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation, especially given Fortinet's widespread deployment in European enterprises and critical infrastructure.

Mitigation Recommendations

1. Apply vendor patches or updates as soon as they become available for FortiOS versions 7.0.0 through 7.6.4 to remediate the vulnerability. 2. Restrict administrative and user access to FortiOS management interfaces using network segmentation, VPNs, and multi-factor authentication to reduce the risk of unauthorized authenticated access. 3. Review and harden FSSO policy configurations to limit exposure and ensure only necessary users have access to sensitive network resources. 4. Monitor FortiOS logs and network traffic for unusual or unauthorized access attempts related to FSSO policies and crafted requests. 5. Conduct regular internal audits of user privileges and access controls to detect and remediate excessive permissions that could be exploited. 6. Implement network segmentation and zero-trust principles to minimize the impact of compromised accounts. 7. Educate administrators and security teams on the specifics of this vulnerability to improve detection and response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-10-14T08:08:14.905Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698c57814b57a58fa18c033c

Added to database: 2/11/2026, 10:18:41 AM

Last enriched: 2/18/2026, 3:18:25 PM

Last updated: 4/1/2026, 4:34:38 AM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses