HomeVulnerabilityFortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited within the Wild

Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited within the Wild

Fortinet has warned of a brand new security flaw in FortiWeb that it mentioned has been exploited within the wild.

The medium-severity vulnerability, tracked as CVE-2025-58034, carries a CVSS rating of 6.7 out of a most of 10.0.

“An Improper Neutralization of Particular Parts utilized in an OS Command (‘OS Command Injection’) vulnerability [CWE-78] in FortiWeb might enable an authenticated attacker to execute unauthorized code on the underlying system by way of crafted HTTP requests or CLI instructions,” the corporate mentioned in a Tuesday advisory.

In different phrases, profitable assaults require an attacker to first authenticate themselves by means of another means and chain it with CVE-2025-58034 to execute arbitrary working system instructions.

CIS Build Kits

It has been addressed within the following variations –

  • FortiWeb 8.0.0 by means of 8.0.1 (Improve to eight.0.2 or above)
  • FortiWeb 7.6.0 by means of 7.6.5 (Improve to 7.6.6 or above)
  • FortiWeb 7.4.0 by means of 7.4.10 (Improve to 7.4.11 or above)
  • FortiWeb 7.2.0 by means of 7.2.11 (Improve to 7.2.12 or above)
  • FortiWeb 7.0.0 by means of 7.0.11 (Improve to 7.0.12 or above)
See also  Uncovered JDWP Interfaces Result in Crypto Mining, Hpingbot Targets SSH for DDoS

The corporate credited Development Micro researcher Jason McFadyen for reporting the flaw beneath its accountable disclosure coverage.

Curiously, the event comes days after Fortinet confirmed that it silently patched one other essential FortiWeb vulnerability (CVE-2025-64446, CVSS rating: 9.1) in model 8.0.2.

“We activated our PSIRT response and remediation efforts as quickly as we discovered of this matter, and people efforts stay ongoing,” a Fortinet spokesperson advised The Hacker Information. “Fortinet diligently balances our dedication to the security of our clients and our tradition of accountable transparency.”

It is at the moment not clear why Fortinet opted to patch the failings with out releasing an advisory. However the transfer has left defenders at an obstacle, successfully stopping them from mounting an satisfactory response.

“When standard know-how distributors fail to speak new security points, they’re issuing an invite to attackers whereas selecting to maintain that very same data from defenders,” VulnCheck famous final week.

See also  Vital vulnerability in IBM API Join might permit authentication bypass
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular