Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64157: Execute unauthorized code or commands in Fortinet FortiOS

0
Medium
VulnerabilityCVE-2025-64157cvecve-2025-64157
Published: Tue Feb 10 2026 (02/10/2026, 15:39:12 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

A use of externally-controlled format string vulnerability in Fortinet FortiOS 7.6.0 through 7.6.4, FortiOS 7.4.0 through 7.4.9, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0 all versions allows an authenticated admin to execute unauthorized code or commands via specifically crafted configuration.

AI-Powered Analysis

AILast updated: 02/10/2026, 16:47:27 UTC

Technical Analysis

CVE-2025-64157 is a vulnerability identified in multiple versions of Fortinet's FortiOS (7.0.0 through 7.6.4) that stems from an externally-controlled format string flaw. This vulnerability allows an authenticated administrator to execute unauthorized code or commands by submitting a specially crafted configuration. The flaw resides in how FortiOS processes certain input strings, which can be manipulated to execute arbitrary code, potentially leading to full system compromise. The attack vector is local, requiring the attacker to have administrative privileges on the device, which limits exploitation to insiders or attackers who have already gained elevated access. The vulnerability affects confidentiality, integrity, and availability of the FortiOS device, as unauthorized code execution can lead to data leakage, configuration manipulation, or denial of service. The CVSS 3.1 base score is 6.7, categorized as medium severity, reflecting the requirement for high privileges and no user interaction. No public exploits or active exploitation have been reported yet, but the impact of successful exploitation is significant given FortiOS’s role in network security. Fortinet has not yet published patches, so organizations must monitor vendor advisories closely. FortiOS is widely deployed in enterprise and critical infrastructure environments, making this vulnerability a notable risk for network security.

Potential Impact

For European organizations, the impact of CVE-2025-64157 can be substantial due to FortiOS’s widespread use in securing enterprise networks, data centers, and critical infrastructure. Successful exploitation could allow an attacker with administrative access to execute arbitrary commands, potentially leading to full device compromise. This could result in unauthorized access to sensitive data, disruption of network security functions, and the ability to pivot within the network for further attacks. Given the role of FortiOS in firewalling, VPN, and intrusion prevention, exploitation could degrade network availability and integrity, impacting business continuity and regulatory compliance. Organizations in sectors such as finance, energy, telecommunications, and government are particularly at risk due to their reliance on Fortinet devices for perimeter and internal security. The requirement for authenticated access reduces the risk from external attackers but elevates the threat from insider threats or attackers who have already breached perimeter defenses. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

1. Immediately restrict administrative access to FortiOS devices to a minimal set of trusted personnel using strong authentication mechanisms such as multi-factor authentication (MFA). 2. Monitor administrative logs and network traffic for unusual or unauthorized configuration changes or command executions. 3. Implement network segmentation and access controls to limit the ability of compromised accounts to access FortiOS management interfaces. 4. Regularly audit and review administrator accounts and permissions to ensure least privilege principles are enforced. 5. Stay alert for Fortinet’s official patches or updates addressing CVE-2025-64157 and apply them promptly once available. 6. Consider deploying compensating controls such as Web Application Firewalls (WAFs) or Intrusion Detection/Prevention Systems (IDS/IPS) to detect anomalous activity targeting FortiOS management interfaces. 7. Conduct internal security awareness training to reduce the risk of credential compromise among administrators. 8. Use configuration management and backup tools to quickly restore known-good configurations in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-10-28T12:26:50.750Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b5d5f4b57a58fa119cfbc

Added to database: 2/10/2026, 4:31:27 PM

Last enriched: 2/10/2026, 4:47:27 PM

Last updated: 2/21/2026, 12:13:52 AM

Views: 145

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats