Skip to main content

Fortinet FortiWeb Path Traversal Vulnerability Under Zero-Day Exploitation

Security researchers have observed mass exploitation of CVE-2025-64446 in the wild.

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Security researchers have observed mass exploitation of CVE-2025-64446 in the wild.


Threat details

Mass Exploitation of CVE-2025-64446 Observed

Security researchers at CERT Orange Cyberdefense have reported mass exploitation of CVE-2025-64446 in the Fortinet FortiWeb management console, with first exploitation observed in July 2025. The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-64446 to their Known Exploited Vulnerabilities (KEV) Catalog.

Researchers at watchTowr have also released a "detection artifact generator" that can easily be modified into a proof-of-concept exploit. The NHS England National CSOC assesses further exploitation as highly likely.


Introduction

Security researchers at PwnDefend and Defused have reported zero-day exploitation of a path traversal vulnerability that could allow a remote, unauthenticated attacker to bypass authentication in the management console of Fortinet FortiWeb appliances.

Fortinet has now published an advisory for CVE-2025-64446.

  • CVE-2025-64446 - "Relative Path Traversal" Vulnerability - CVSSv3 score: 9.1

Threat updates

Date Update
21 Nov 2025 Confirmed affected versions in Affected Platforms.
17 Nov 2025 Fortinet advisory released.

The following sections have been updated to reflect this change:

  • Title updated to reflect Common Weakness Enumeration (CWE) for CVE-2025-64446
  • Affected versions of FortiWeb
  • Exploitation details
  • Introduction
  • Remediation advice & steps

Remediation advice

Affected organisations are strongly encouraged to review Fortinet PSIRT advisory FG-IR-25-910 and follow the remediation steps detailed below.


Remediation steps

Type Step
Patch

Affected organisations are strongly encouraged to update Fortinet FortiWeb to one of the following versions as soon as possible.

Fixed versions:

  • version 8.0.2
  • version 7.6.5
  • version 7.4.10
  • version 7.2.12
  • version 7.0.12

https://www.fortiguard.com/psirt/FG-IR-25-910
Guidance

Affected organisations are encouraged to restrict access to management consoles for network security appliances, including FortiWeb, to known, trusted access points. Organisations are strongly encouraged to disable access to the management console from the internet.


https://www.fortiguard.com/psirt/FG-IR-25-910


Last edited: 21 November 2025 11:47 am