Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64447: Escalation of privilege in Fortinet FortiWeb

0
High
VulnerabilityCVE-2025-64447cvecve-2025-64447
Published: Tue Dec 09 2025 (12/09/2025, 17:18:42 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiWeb

Description

A reliance on cookies without validation and integrity checking vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.5, FortiWeb 7.4.0 through 7.4.10, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an unauthenticated attacker to execute arbitrary operations on the system via crafted HTTP or HTTPS request via forged cookies, requiring prior knowledge of the FortiWeb serial number.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:18:07 UTC

Technical Analysis

CVE-2025-64447 is a vulnerability identified in multiple versions of Fortinet's FortiWeb web application firewall, specifically versions 7.0.0 through 8.0.1. The root cause is the product's reliance on cookies for session or operation validation without adequate integrity checking or validation mechanisms. This flaw allows an unauthenticated attacker, who possesses prior knowledge of the FortiWeb device's serial number, to craft HTTP or HTTPS requests containing forged cookies. These malicious requests can bypass normal security controls and execute arbitrary operations on the FortiWeb system, effectively escalating privileges without authentication. The vulnerability affects a broad range of FortiWeb versions, indicating a systemic issue in the cookie handling mechanism across multiple releases. The CVSS v3.1 base score is 7.1, reflecting high severity with network attack vector, high impact on confidentiality, integrity, and availability, and no user interaction required. The attack complexity is high due to the need for the serial number, but no privileges or user interaction are needed, making exploitation feasible in targeted scenarios. FortiWeb devices are critical security components deployed to protect web applications from attacks, so compromise can lead to significant security breaches. No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly.

Potential Impact

The exploitation of CVE-2025-64447 can have severe consequences for organizations worldwide. Since FortiWeb devices serve as web application firewalls, their compromise can lead to unauthorized access to protected web applications, data leakage, and manipulation of traffic. Attackers gaining arbitrary operation capabilities on FortiWeb can disable or alter security policies, bypass protections, and potentially pivot to internal networks. This threatens the confidentiality, integrity, and availability of critical business applications and sensitive data. The vulnerability's requirement for the FortiWeb serial number limits broad exploitation but does not eliminate risk, especially for targeted attacks against high-value organizations. Industries relying heavily on FortiWeb for web security, such as finance, healthcare, government, and telecommunications, face increased risk of data breaches, service disruption, and reputational damage. Additionally, the ability to perform these actions without authentication increases the attack surface and urgency for mitigation.

Mitigation Recommendations

Organizations should immediately inventory their FortiWeb deployments to identify affected versions (7.0.0 through 8.0.1). Although no official patches are linked yet, monitoring Fortinet advisories for updates is critical. In the interim, restrict network access to FortiWeb management interfaces to trusted IP addresses only, minimizing exposure. Implement strict network segmentation to isolate FortiWeb devices from untrusted networks. Enable detailed logging and monitoring on FortiWeb to detect anomalous requests, especially those with unusual cookie values or originating from unexpected sources. Employ intrusion detection/prevention systems (IDS/IPS) to flag suspicious HTTP/HTTPS traffic patterns. Rotate or obscure FortiWeb serial numbers where possible to reduce the risk of attackers obtaining this prerequisite information. Conduct regular security assessments and penetration testing to validate the effectiveness of compensating controls. Once patches are released, apply them promptly and verify the integrity of the FortiWeb systems post-update.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-11-04T14:26:34.042Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69385e4e74ebaa3baba142b8

Added to database: 12/9/2025, 5:37:18 PM

Last enriched: 2/27/2026, 6:18:07 AM

Last updated: 3/25/2026, 3:08:41 AM

Views: 227

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses