Saturday, April 26, 2025
HomeCyber Security NewsFortinet Warns of Multiple Vulnerabilities in FortiAnalyzer, FortiManager, & Other Products

Fortinet Warns of Multiple Vulnerabilities in FortiAnalyzer, FortiManager, & Other Products

Published on

SIEM as a Service

Follow Us on Google News

Fortinet has revealed and resolved several vulnerabilities within its range of products, such as FortiAnalyzer, FortiManager, FortiOS, FortiProxy, FortiVoice, FortiWeb, and FortiSwitch.

These weaknesses vary from inadequate filtering of log outputs to unconfirmed password modifications and poorly secured credentials.

The organization has released updates and strategies to protect users from possible exploitation.

- Advertisement - Google News

Vulnerability in FortiOS Due to Inadequately Secured Credentials

A significant vulnerability found in FortiOS pertains to inadequately secured credentials (CWE-522).

This issue may enable an authenticated attacker with privileges to obtain LDAP credentials by altering the LDAP server IP address in the configuration to point to a malicious server.

Affected Versions:

  • All versions of FortiOS 7.4, 7.2, 7.0, and 6.4 are vulnerable.
  • FortiOS 7.6 is not affected.

Users are encouraged to transition to stable releases by utilizing Fortinet’s upgrade tool. Fortinet recognized Vladislav Driev and Oleg Labyntsev for their responsible disclosure of this vulnerability.

Inadequate Output Neutralization

A different vulnerability (CWE-117) impacts FortiManager and FortiAnalyzer, which might enable unauthenticated remote attackers to corrupt logs through specially crafted login requests.

Affected Versions:

  • Vulnerable versions include 7.6.0–7.6.1 for both products.
  • Earlier versions such as 7.4.x and 7.2.x are also affected.

Users are encouraged to update to FortiManager and FortiAnalyzer versions 7.6.2 or higher. Fortinet recognized Alexandre Labb from A1 Digital International for bringing this issue to their attention.

Man-in-the-Middle Vulnerability

Multiple products, such as FortiOS, FortiProxy, FortiManager, and others, were identified to have a man-in-the-middle vulnerability (CWE-923).

This vulnerability may allow attackers to take on the identity of management devices by capturing authentication requests exchanged between managed devices and management systems like FortiCloud or FortiManager.

Affected Versions:

  • Vulnerable versions span across multiple releases of FortiOS (6.x–7.x), FortiProxy (2.x–7.x), and other products such as FortiVoice and FortiWeb.

Users should upgrade to fixed versions as specified in the advisory. Théo Leleu of the Product Security team and Stephen Bevan from the Development team at Fortinet internally discovered this vulnerability.

Unconfirmed Vulnerability for Password Changes

Fortinet also disclosed an unverified password change vulnerability (CWE-620) in the GUI of its FortiSwitch product. This issue could allow remote unauthenticated attackers to modify admin passwords through specially crafted requests.

Affected Versions:

  • Versions 6.4.x–7.x are vulnerable.

Upgrade to fixed versions or disable HTTP/HTTPS access from administrative interfaces as a workaround. Daniel Rozeboom of the FortiSwitch web UI development team was credited for discovering this flaw.

Fortinet strongly recommends users upgrade their systems immediately using its upgrade tool or apply available workarounds where patching is not feasible.

The company has worked closely with researchers and international agencies to ensure timely disclosure and mitigation strategies.

Acknowledging the contributions of security researchers like Vladislav Driev, Oleg Labyntsev, Alexandre Labb, Théo Leleu, Stephen Bevan, and Daniel Rozeboom under responsible disclosure practices underscores the collaborative effort in addressing these vulnerabilities.

All advisories were published on April 8, 2025, marking an essential step in maintaining transparency and ensuring customer security across its product ecosystem.

Users can refer to Fortinet’s official documentation for detailed guidance on upgrading or mitigating risks associated with these vulnerabilities.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Threat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users

Researchers from Unit 42 have uncovered a massive wave of SMS phishing, or "smishing,"...

Russian Hackers Attempt to Sabotage Digital Control Systems of Dutch Public Service

The Dutch Defense Ministry has revealed that critical infrastructure, democratic processes, and North Sea...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Threat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users

Researchers from Unit 42 have uncovered a massive wave of SMS phishing, or "smishing,"...