Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67685: Improper access control in Fortinet FortiSandbox

0
Low
VulnerabilityCVE-2025-67685cvecve-2025-67685
Published: Tue Jan 13 2026 (01/13/2026, 16:32:29 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiSandbox

Description

CVE-2025-67685 is a Server-Side Request Forgery (SSRF) vulnerability affecting multiple versions of Fortinet FortiSandbox (4. 0. x through 5. 0. 4). It allows an authenticated attacker to send crafted HTTP requests that proxy internal requests to plaintext endpoints. The vulnerability requires high privileges and does not require user interaction. Although the CVSS score is low (3. 4), the vulnerability could lead to limited information disclosure and potential internal network reconnaissance. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 01/13/2026, 17:12:47 UTC

Technical Analysis

CVE-2025-67685 is a Server-Side Request Forgery (SSRF) vulnerability identified in Fortinet FortiSandbox versions 5.0.0 through 5.0.4, as well as all versions of 4.4, 4.2, and 4.0. FortiSandbox is a security appliance used for advanced threat detection and sandboxing of suspicious files and network traffic. The vulnerability arises from improper access control that allows an authenticated attacker with high privileges to craft HTTP requests that the FortiSandbox server proxies internally. These proxied requests are limited to plaintext endpoints, which restricts the attacker's ability to access encrypted or sensitive internal services directly. The SSRF flaw can be exploited to perform internal network reconnaissance, potentially revealing information about internal services and configurations that are otherwise inaccessible externally. The vulnerability does not require user interaction but does require the attacker to have authenticated access with elevated privileges, limiting the attack surface. The CVSS v3.1 score is 3.4 (low severity), reflecting limited impact on confidentiality and integrity, no impact on availability, and the requirement for high privileges. No public exploits or active exploitation have been reported to date. The vulnerability is classified under CWE-918 (Server-Side Request Forgery), indicating a failure to properly validate or sanitize user-supplied URLs that the server uses to make requests. Fortinet has not yet published patches or mitigation instructions at the time of this report, but organizations are advised to monitor for updates and apply them promptly once available.

Potential Impact

For European organizations, the impact of CVE-2025-67685 is primarily related to confidentiality and integrity risks within internal networks. An attacker with authenticated access to FortiSandbox could leverage the SSRF vulnerability to probe internal systems and services that are not exposed externally, potentially gathering sensitive information or mapping internal network topology. This reconnaissance could facilitate subsequent attacks such as lateral movement or exploitation of other vulnerabilities. Although the vulnerability does not directly affect availability, the exposure of internal endpoints could undermine trust in the security infrastructure and lead to compliance issues, especially under GDPR and other data protection regulations. Organizations relying heavily on FortiSandbox for malware analysis and threat detection may face operational risks if attackers manipulate or bypass sandboxing processes. The requirement for high privileges and authentication reduces the likelihood of widespread exploitation but does not eliminate insider threats or risks from compromised credentials. Overall, the vulnerability represents a moderate risk that should be addressed promptly to maintain the integrity of internal security operations.

Mitigation Recommendations

1. Restrict access to the FortiSandbox management interface to trusted administrators only, using network segmentation, VPNs, or zero-trust access controls. 2. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. 3. Monitor FortiSandbox logs and network traffic for unusual or unauthorized internal requests that could indicate SSRF exploitation attempts. 4. Apply the latest Fortinet security updates and patches as soon as they become available for FortiSandbox versions 4.0 through 5.0.4. 5. Implement strict input validation and filtering on any interfaces interacting with FortiSandbox to prevent injection of malicious HTTP requests. 6. Conduct regular security audits and penetration tests focusing on internal network access controls and FortiSandbox configurations. 7. Consider deploying network-level controls to limit FortiSandbox’s ability to make arbitrary HTTP requests to internal endpoints, such as firewall rules or proxy restrictions. 8. Educate administrators about the risks of SSRF and the importance of safeguarding privileged credentials.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-12-10T10:45:43.496Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69667941a60475309f8fa6bd

Added to database: 1/13/2026, 4:56:33 PM

Last enriched: 1/13/2026, 5:12:47 PM

Last updated: 1/13/2026, 6:11:37 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats