Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64447: Escalation of privilege in Fortinet FortiWeb

0
High
VulnerabilityCVE-2025-64447cvecve-2025-64447
Published: Tue Dec 09 2025 (12/09/2025, 17:18:42 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiWeb

Description

A reliance on cookies without validation and integrity checking vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.5, FortiWeb 7.4.0 through 7.4.10, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an unauthenticated attacker to execute arbitrary operations on the system via crafted HTTP or HTTPS request via forged cookies, requiring prior knowledge of the FortiWeb serial number.

AI-Powered Analysis

AILast updated: 01/14/2026, 14:50:50 UTC

Technical Analysis

CVE-2025-64447 is a vulnerability identified in multiple versions of Fortinet's FortiWeb web application firewall (WAF) product, specifically versions 7.0.0 through 8.0.1. The root cause is FortiWeb's reliance on cookies for session or operation validation without implementing sufficient validation or integrity checking mechanisms. This design flaw allows an unauthenticated attacker, who must have prior knowledge of the FortiWeb device's serial number, to craft HTTP or HTTPS requests containing forged cookies. These malicious requests can bypass normal security controls and execute arbitrary operations on the FortiWeb system, effectively escalating privileges without authentication. The vulnerability affects the confidentiality, integrity, and availability of the FortiWeb device and potentially the protected web applications. The CVSS v3.1 base score is 7.1, indicating high severity, with an attack vector of network (AV:N), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no public exploits have been reported, the vulnerability's characteristics make it a critical concern for organizations relying on FortiWeb for web application security. The lack of patch links suggests that remediation may require vendor updates or configuration changes once available.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those deploying FortiWeb appliances to protect critical web applications and infrastructure. Exploitation could allow attackers to gain unauthorized control over FortiWeb devices, potentially leading to interception or manipulation of web traffic, bypassing security policies, or disrupting service availability. This could result in data breaches, service outages, or further lateral movement within networks. Given FortiWeb's role in securing web applications, successful exploitation could undermine trust in protected services and expose sensitive customer or business data. The requirement for prior knowledge of the serial number somewhat limits the attack surface but does not eliminate risk, as serial numbers can sometimes be discovered through information leakage or reconnaissance. European sectors such as finance, government, healthcare, and telecommunications, which heavily rely on web application firewalls, are particularly vulnerable. Additionally, the high complexity of attack may reduce immediate widespread exploitation but should not lead to complacency.

Mitigation Recommendations

European organizations should immediately inventory their FortiWeb deployments to identify affected versions (7.0.0 through 8.0.1). Until official patches are released by Fortinet, organizations should implement compensating controls such as restricting network access to FortiWeb management interfaces to trusted IPs only, employing strict firewall rules, and monitoring for anomalous HTTP/HTTPS requests with suspicious cookie values. Fortinet customers should engage with vendor support to obtain patches or recommended configuration changes as soon as they become available. Additionally, organizations should enhance logging and alerting on FortiWeb devices to detect potential exploitation attempts, including unusual cookie usage or unauthorized operations. Regularly updating device firmware and applying security best practices for web application firewall deployment will reduce exposure. Finally, organizations should conduct penetration testing and vulnerability assessments focusing on FortiWeb to validate the effectiveness of mitigations and detect any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-11-04T14:26:34.042Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69385e4e74ebaa3baba142b8

Added to database: 12/9/2025, 5:37:18 PM

Last enriched: 1/14/2026, 2:50:50 PM

Last updated: 2/4/2026, 2:23:47 PM

Views: 181

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats