Executive Summary
In November 2025, Fortinet disclosed two critical vulnerabilities (CVE-2025-64446 and CVE-2025-58034) affecting multiple versions of its FortiWeb web application firewall. Exploited as a chained attack, the first flaw—relative path traversal—enabled unauthenticated attackers to execute administrative commands via crafted HTTP/HTTPS requests, while the second—OS command injection—allowed privilege escalation and execution of unauthorized code by authenticated users. Security agencies confirmed observed exploitation in the wild, with potential impact including network compromise, lateral movement, and loss of control over critical web applications. Fortinet and CISA urged immediate upgrades and review of affected deployments.
This incident underscores a broader trend of adversaries targeting internet-facing security appliances as entry points, chaining vulnerabilities for deeper network access. The rapid inclusion of these CVEs in CISA’s Known Exploited Vulnerabilities catalog reflects the elevated urgency and broader risk to organizations across sectors relying on web application firewalls as a key security control.
Why This Matters Now
These actively exploited vulnerabilities put a wide range of organizations at urgent risk for remote compromise and privilege escalation. With adversaries increasingly targeting security infrastructure for initial access, timely patching and strong segmentation practices are crucial to prevent full network breaches and comply with regulatory requirements.
Attack Path Analysis
The attacker exploited the unauthenticated relative path traversal vulnerability (CVE-2025-64446) to gain initial access to the vulnerable FortiWeb system, then chained an OS command injection vulnerability (CVE-2025-58034) to escalate privileges and execute arbitrary commands. With elevated access, the attacker could move laterally to other workloads in the network, establish command and control through outbound traffic, exfiltrate sensitive configuration or data, and ultimately disrupt operations or modify systems for persistence or impact.
Kill Chain Progression
Initial Compromise
Description
Attacker exploited CVE-2025-64446 via specially crafted HTTP/HTTPS requests to gain unauthenticated access to the FortiWeb WAF.
Related CVEs
CVE-2025-64446
CVSS 9.8A relative path traversal vulnerability in Fortinet FortiWeb may allow an unauthenticated attacker to execute administrative commands via crafted HTTP or HTTPS requests.
Affected Products:
Fortinet FortiWeb – 8.0.0 through 8.0.1, 7.6.0 through 7.6.4, 7.4.0 through 7.4.9, 7.2.0 through 7.2.11, 7.0.0 through 7.0.11
Exploit Status:
exploited in the wildCVE-2025-58034
CVSS 8.8An OS Command Injection vulnerability in Fortinet FortiWeb may allow an authenticated attacker to execute unauthorized code via crafted HTTP requests or CLI commands.
Affected Products:
Fortinet FortiWeb – 8.0.0 through 8.0.1, 7.6.0 through 7.6.5, 7.4.0 through 7.4.10, 7.2.0 through 7.2.11, 7.0.0 through 7.0.11
Exploit Status:
exploited in the wildCVE-2025-64447
CVSS 7.5A reliance on cookies without validation and integrity checking vulnerability in Fortinet FortiWeb may allow an unauthenticated attacker to execute arbitrary operations via forged cookies, requiring prior knowledge of the FortiWeb serial number.
Affected Products:
Fortinet FortiWeb – 8.0.0 through 8.0.1, 7.6.0 through 7.6.5, 7.4.0 through 7.4.10, 7.2.0 through 7.2.11, 7.0.0 through 7.0.11
Exploit Status:
no public exploit
MITRE ATT&CK® Techniques
Exploit Public-Facing Application
Command and Scripting Interpreter
Exploitation for Privilege Escalation
Valid Accounts
Abuse Elevation Control Mechanism
Impair Defenses
Application Layer Protocol
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Security of System Components from Known Vulnerabilities
Control ID: 6.2.3
NYDFS 23 NYCRR 500 – Access Privileges
Control ID: 500.07
DORA – ICT Risk Management and Operational Resilience
Control ID: Article 9, 10
CISA ZTMM 2.0 – Automated Asset Inventory and Vulnerability Remediation
Control ID: Asset Management - 2.2.1
NIS2 Directive – Supply Chain Security & Vulnerability Management Measures
Control ID: Article 21(2)(d), (f)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Financial Services
Critical exposure through FortiWeb WAF vulnerabilities enabling unauthenticated remote code execution, threatening customer data and regulatory compliance requirements.
Health Care / Life Sciences
High-risk impact from chained CVE exploits allowing administrative command execution, potentially compromising patient data and HIPAA compliance frameworks.
Government Administration
Severe security implications from path traversal and command injection vulnerabilities in web application firewalls protecting critical government infrastructure.
Information Technology/IT
Direct operational impact as IT organizations manage FortiWeb deployments, facing immediate patching requirements and potential service disruptions.
Sources
- Fortinet Releases Security Advisory for Relative Path Traversal Vulnerability Affecting FortiWeb Productshttps://www.cisa.gov/news-events/alerts/2025/11/14/fortinet-releases-security-advisory-relative-path-traversal-vulnerability-affecting-fortiwebVerified
- Path confusion vulnerability in GUIhttps://fortiguard.fortinet.com/psirt/FG-IR-25-910Verified
- Multiple OS command injection in API and CLIhttps://fortiguard.fortinet.com/psirt/FG-IR-25-513Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Zero Trust segmentation, distributed policy enforcement, network-based threat detection, and egress controls provided by CNSF could have restricted initial access, isolated workloads to contain escalation and lateral movement, and detected or blocked malicious outbound and exfiltration attempts across the attack lifecycle.
Control: Zero Trust Segmentation
Mitigation: Prevents direct access to management interfaces from untrusted networks.
Control: Inline IPS (Suricata)
Mitigation: Detects and blocks malicious payloads matching known exploit or command injection signatures.
Control: East-West Traffic Security
Mitigation: Segmentation and inspection of internal workload traffic limits spread.
Control: Egress Security & Policy Enforcement
Mitigation: Blocks unauthorized outbound communications and detects C2 attempts.
Control: Threat Detection & Anomaly Response
Mitigation: Detects abnormal data flows and alerts on potential exfiltration.
Provides real-time visibility and automated response to unauthorized changes.
Impact at a Glance
Affected Business Functions
- Web Application Firewall Management
- Network Security Operations
Estimated downtime: 3 days
Estimated loss: $500,000
Potential exposure of sensitive configuration data and administrative credentials due to unauthorized command execution.
Recommended Actions
Key Takeaways & Next Steps
- • Immediately upgrade all vulnerable FortiWeb instances to patched versions as per vendor guidance.
- • Enforce Zero Trust segmentation policies to strictly limit internet-facing management interface access.
- • Deploy inline IPS and egress filtering to detect exploit attempts and block unauthorized outbound C2 or exfiltration traffic.
- • Enhance east-west traffic inspection and workload isolation to contain potential lateral movement.
- • Continuously monitor for anomalous outbound data flows and implement automated alerting and response for suspicious activities.



