Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet FortiWeb Web Application Firewall (WAF) that could allow an attacker to take over admin accounts and completely compromise a device. "The watchTowr team is seeing active, indiscriminate in-the-wild exploitation of what appears to be a silently patched vulnerability in Fortinet's FortiWeb
AI Analysis
Technical Summary
The Fortinet FortiWeb WAF suffers from a critical authentication bypass vulnerability that has been actively exploited in the wild. The vulnerability is a combination of two flaws: a path traversal vulnerability in the HTTP request targeting the "/api/v2.0/cmdb/system/admin%3F/../../../../../cgi-bin/fwbcgi" endpoint, and an authentication bypass via the CGIINFO HTTP request header. The "fwbcgi" binary processes the CGIINFO header by decoding a Base64-encoded JSON blob containing user attributes such as username, profile name, virtual domain, and login name. By crafting this JSON with values corresponding to the built-in admin account (username "admin", profname "prof_admin", vdom "root", loginname "admin"), an attacker can impersonate the admin user without valid credentials. This allows the attacker to perform any privileged action, including creating new administrator accounts for persistence. Exploitation involves sending a malicious HTTP POST request with the crafted CGIINFO header to the vulnerable endpoint. The flaw was silently patched in FortiWeb version 8.0.2, but many devices remain unpatched and vulnerable. Security researchers have reproduced the vulnerability and released proof-of-concept tools to detect susceptible devices. The attacks are indiscriminate and ongoing, with multiple attacker-created admin accounts detected in the wild. No CVE has been assigned yet, and Fortinet has not published an official advisory. Rapid7 reported a zero-day exploit for sale on a black hat forum, possibly related. The vulnerability poses a severe risk of full device compromise, unauthorized access, and potential lateral movement within networks protected by FortiWeb appliances.
Potential Impact
For European organizations, the impact of this vulnerability is significant. FortiWeb appliances are widely deployed in Europe for web application security, protecting critical infrastructure, government services, financial institutions, and enterprises. Successful exploitation allows attackers to gain full administrative control over the WAF, enabling them to disable protections, manipulate traffic, and potentially pivot to internal networks. This can lead to data breaches, service outages, and loss of trust. The creation of persistent admin accounts complicates incident response and forensic investigations. Given the indiscriminate nature of attacks and the availability of proof-of-concept exploits, unpatched European organizations face high risk of compromise. The threat is particularly acute for sectors with high-value targets such as finance, healthcare, and public administration. Additionally, attackers could leverage compromised WAFs to facilitate further attacks like injection, data exfiltration, or ransomware deployment, amplifying the overall impact.
Mitigation Recommendations
European organizations should immediately verify their FortiWeb appliance versions and apply the official patch in version 8.0.2 or later. If patching is not immediately possible, network-level mitigations such as restricting access to the management interface and the vulnerable API endpoint to trusted IPs should be enforced. Organizations should conduct thorough forensic analysis to detect any signs of compromise, including the presence of unauthorized admin accounts with suspicious usernames. Monitoring HTTP POST requests to the vulnerable endpoint and inspecting CGIINFO headers for anomalies can help detect exploitation attempts. Deploying Web Application Firewall logs and SIEM correlation rules to alert on suspicious admin account creation is recommended. Organizations should also review and tighten access controls and credentials for FortiWeb appliances. Engaging with Fortinet support for guidance and updates is advised. Finally, organizations should educate their security teams about this threat to ensure rapid detection and response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Switzerland
Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
Description
Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet FortiWeb Web Application Firewall (WAF) that could allow an attacker to take over admin accounts and completely compromise a device. "The watchTowr team is seeing active, indiscriminate in-the-wild exploitation of what appears to be a silently patched vulnerability in Fortinet's FortiWeb
AI-Powered Analysis
Technical Analysis
The Fortinet FortiWeb WAF suffers from a critical authentication bypass vulnerability that has been actively exploited in the wild. The vulnerability is a combination of two flaws: a path traversal vulnerability in the HTTP request targeting the "/api/v2.0/cmdb/system/admin%3F/../../../../../cgi-bin/fwbcgi" endpoint, and an authentication bypass via the CGIINFO HTTP request header. The "fwbcgi" binary processes the CGIINFO header by decoding a Base64-encoded JSON blob containing user attributes such as username, profile name, virtual domain, and login name. By crafting this JSON with values corresponding to the built-in admin account (username "admin", profname "prof_admin", vdom "root", loginname "admin"), an attacker can impersonate the admin user without valid credentials. This allows the attacker to perform any privileged action, including creating new administrator accounts for persistence. Exploitation involves sending a malicious HTTP POST request with the crafted CGIINFO header to the vulnerable endpoint. The flaw was silently patched in FortiWeb version 8.0.2, but many devices remain unpatched and vulnerable. Security researchers have reproduced the vulnerability and released proof-of-concept tools to detect susceptible devices. The attacks are indiscriminate and ongoing, with multiple attacker-created admin accounts detected in the wild. No CVE has been assigned yet, and Fortinet has not published an official advisory. Rapid7 reported a zero-day exploit for sale on a black hat forum, possibly related. The vulnerability poses a severe risk of full device compromise, unauthorized access, and potential lateral movement within networks protected by FortiWeb appliances.
Potential Impact
For European organizations, the impact of this vulnerability is significant. FortiWeb appliances are widely deployed in Europe for web application security, protecting critical infrastructure, government services, financial institutions, and enterprises. Successful exploitation allows attackers to gain full administrative control over the WAF, enabling them to disable protections, manipulate traffic, and potentially pivot to internal networks. This can lead to data breaches, service outages, and loss of trust. The creation of persistent admin accounts complicates incident response and forensic investigations. Given the indiscriminate nature of attacks and the availability of proof-of-concept exploits, unpatched European organizations face high risk of compromise. The threat is particularly acute for sectors with high-value targets such as finance, healthcare, and public administration. Additionally, attackers could leverage compromised WAFs to facilitate further attacks like injection, data exfiltration, or ransomware deployment, amplifying the overall impact.
Mitigation Recommendations
European organizations should immediately verify their FortiWeb appliance versions and apply the official patch in version 8.0.2 or later. If patching is not immediately possible, network-level mitigations such as restricting access to the management interface and the vulnerable API endpoint to trusted IPs should be enforced. Organizations should conduct thorough forensic analysis to detect any signs of compromise, including the presence of unauthorized admin accounts with suspicious usernames. Monitoring HTTP POST requests to the vulnerable endpoint and inspecting CGIINFO headers for anomalies can help detect exploitation attempts. Deploying Web Application Firewall logs and SIEM correlation rules to alert on suspicious admin account creation is recommended. Organizations should also review and tighten access controls and credentials for FortiWeb appliances. Engaging with Fortinet support for guidance and updates is advised. Finally, organizations should educate their security teams about this threat to ensure rapid detection and response.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/11/fortinet-fortiweb-flaw-actively.html","fetched":true,"fetchedAt":"2025-11-14T23:36:25.957Z","wordCount":1269}
Threat ID: 6917bcfbed594783724528db
Added to database: 11/14/2025, 11:36:27 PM
Last enriched: 11/14/2025, 11:37:44 PM
Last updated: 1/7/2026, 4:23:35 AM
Views: 111
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users
LowRisks of OOB Access via IP KVM Devices, (Mon, Jan 5th)
LowCryptocurrency Scam Emails and Web Pages As We Enter 2026, (Sun, Jan 4th)
MediumRondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers
CriticalInfostealer Malware Delivered in EmEditor Supply Chain Attack
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.