Fortinet FortiWeb Path Traversal Vulnerability Under Zero-Day Exploitation
Security researchers have observed mass exploitation of CVE-2025-64446 in the wild.
Summary
Security researchers have observed mass exploitation of CVE-2025-64446 in the wild.
Affected platforms
The following platforms are known to be affected:
Threat details
Mass Exploitation of CVE-2025-64446 Observed
Security researchers at CERT Orange Cyberdefense have reported mass exploitation of CVE-2025-64446 in the Fortinet FortiWeb management console, with first exploitation observed in July 2025. The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-64446 to their Known Exploited Vulnerabilities (KEV) Catalog.
Researchers at watchTowr have also released a "detection artifact generator" that can easily be modified into a proof-of-concept exploit. The NHS England National CSOC assesses further exploitation as highly likely.
Introduction
Security researchers at PwnDefend and Defused have reported zero-day exploitation of a path traversal vulnerability that could allow a remote, unauthenticated attacker to bypass authentication in the management console of Fortinet FortiWeb appliances.
Fortinet has now published an advisory for CVE-2025-64446.
- CVE-2025-64446 - "Relative Path Traversal" Vulnerability - CVSSv3 score: 9.1
Threat updates
| Date | Update |
|---|---|
| 21 Nov 2025 | Confirmed affected versions in Affected Platforms. |
| 17 Nov 2025 |
Fortinet advisory released.
The following sections have been updated to reflect this change:
|
Remediation advice
Affected organisations are strongly encouraged to review Fortinet PSIRT advisory FG-IR-25-910 and follow the remediation steps detailed below.
Remediation steps
| Type | Step |
|---|---|
| Patch |
Affected organisations are strongly encouraged to update Fortinet FortiWeb to one of the following versions as soon as possible. Fixed versions:
https://www.fortiguard.com/psirt/FG-IR-25-910 |
| Guidance |
Affected organisations are encouraged to restrict access to management consoles for network security appliances, including FortiWeb, to known, trusted access points. Organisations are strongly encouraged to disable access to the management console from the internet. https://www.fortiguard.com/psirt/FG-IR-25-910 |
Definitive source of threat updates
Last edited: 21 November 2025 11:47 am