HomeNewsResearchers warn of lengthy‑operating FortiSIEM root exploit vector as new CVE emerges

Researchers warn of lengthy‑operating FortiSIEM root exploit vector as new CVE emerges

“The phMonitor service marshals incoming requests to their acceptable operate handlers based mostly on the kind of command despatched within the API request,” they stated. “Each command handler is mapped to an integer, which is handed within the command message. Safety problem #1 is that every one of those handlers are uncovered and accessible for any distant consumer to invoke with none authentication.”

Previous to the CVE-2025-64155 disclosure, Fortinet had already patched a associated vital command injection flaw in FortiSIEM tracked as CVE-2025-25256 earlier in August 2025. That vulnerability additionally stemmed from improper dealing with of OS instructions enter and was vital sufficient that Fortinet acknowledged working exploit code within the wild, prompting fixes in a number of supported FortiSIEM releases.

Exploit code modifications the danger equation

Whereas Fortinet has launched patches and mitigation steerage, Tenable’s evaluation highlights the probability of real-world assaults as a working exploit code is now public.

“The latest disclosure of CVE-2025-64155 alongside public exploit code is a worrisome begin to 2026,” stated Scott Caveza, senior employees analysis engineer at Tenable. “Though no recognized exploitation has been reported, Fortinet vulnerabilities stay a high prize for attackers–together with nation-state teams.”

See also  Omni Lodges says prospects’ private information stolen in ransomware assault
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular