Article Details

Original Article Text

Click to Toggle View

Fortinet warns of new FortiWeb zero-day exploited in attacks. Today, Fortinet released security updates to patch a new FortiWeb zero-day vulnerability that threat actors are actively exploiting in attacks. Tracked as CVE-2025-58034, this web application firewall security flaw was reported by Jason McFadyen of Trend Micro's Trend Research team. Authenticated threat actors can gain code execution by successfully exploiting this OS command injection vulnerability in low-complexity attacks that don't require user interaction. "An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] in FortiWeb may allow an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests or CLI commands," Fortinet said. "Fortinet has observed this to be exploited in the wild," the American cybersecurity company noted in a Tuesday security advisory. To block incoming attacks, admins are advised to upgrade their FortiWeb devices to the latest available software released today. Last week, Fortinet also confirmed that it silently patched another massively exploited FortiWeb zero-day (CVE-2025-64446) on October 28, three weeks after the threat intel firm Defused first reported active exploitation. According to Defused, attackers are using HTTP POST requests to create new admin-level accounts on Internet-exposed devices. On Friday, CISA also added CVE-2025-64446 to its catalog of actively exploited vulnerabilities and ordered U.S. federal agencies to secure their systems by November 21. BleepingComputer has reached out to Fortinet and Trend Micro with questions about these flaws, but we have yet to receive a response. Earlier this year, in August, Fortinet patched another command injection vulnerability (CVE-2025-25256) with publicly available exploit code in its FortiSIEM security monitoring solution, one day after a report from cybersecurity company GreyNoise regarding a massive spike in brute-force attacks targeting Fortinet SSL VPNs. Fortinet vulnerabilities are often exploited (often as zero days) in cyber espionage and ransomware attacks. For instance, Fortinet disclosed in February that the Chinese Volt Typhoon hacking group exploited two FortiOS SSL VPN flaws (CVE-2022-42475 and CVE-2023-27997) to backdoor a Dutch Ministry of Defence military network using custom Coathanger remote access trojan (RAT) malware. 7 Security Best Practices for MCP As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe. This free cheat sheet outlines 7 best practices you can start using today.

Daily Brief Summary

VULNERABILITIES // Fortinet Patches Critical FortiWeb Zero-Day Exploited in Active Attacks

Fortinet has released updates to address a zero-day vulnerability, CVE-2025-58034, in its FortiWeb application firewall, actively exploited by threat actors.

The flaw, an OS command injection vulnerability, allows authenticated attackers to execute unauthorized code via crafted HTTP requests or CLI commands.

Administrators are urged to upgrade FortiWeb devices immediately to mitigate potential threats from this vulnerability.

The vulnerability was identified by Trend Micro's Jason McFadyen and is considered low-complexity, not requiring user interaction for exploitation.

Fortinet had previously patched another zero-day, CVE-2025-64446, following reports of its exploitation to create admin-level accounts on exposed devices.

CISA has mandated U.S. federal agencies secure systems against CVE-2025-64446 by November 21, emphasizing the critical nature of these vulnerabilities.

Fortinet vulnerabilities have historically been targeted in cyber espionage and ransomware attacks, highlighting the importance of timely patching.