CVE-2025-58034 Fortinet Warnings and Mitigation
- Type: OS Command Injection vulnerability (CWE-78)
- Affected Product: Fortinet FortiWeb (Web Application Firewall)
- Affected Versions:
- 8.0.0 – 8.0.1
- 7.6.0 – 7.6.5
- 7.4.0 – 7.4.10
- 7.2.0 – 7.2.11
- 7.0.0 – 7.0.11 [nvd.nist.gov], [cvedetails.com]
Description
The vulnerability is caused by improper neutralization of special elements used in OS commands. An authenticated attacker can exploit this flaw by sending crafted HTTP requests or CLI commands, allowing them to execute arbitrary code on the underlying system. This can compromise the integrity, confidentiality, and availability of the device. [nvd.nist.gov], [cvedetails.com]
Severity
- CVSS v3.1 Base Score: 7.2 (High)
- Vector:
AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Impact: High on Confidentiality, Integrity, and Availability [cvedetails.com]
Exploitation Status
- Actively Exploited: Yes. Fortinet confirmed exploitation in the wild.
- Attackers can gain remote code execution with authenticated access in low-complexity attacks. [bleepingcomputer.com]
Mitigation
Fortinet has released patches:
- Upgrade to:
- 8.0.2 or above
- 7.6.6 or above
- 7.4.11 or above
- 7.2.12 or above
- 7.0.12 or above [bleepingcomputer.com]
.png)