Emergency Security Bulletin: FortiSIEM OS Command Injection Vulnerability

https://www.redlegg.com/hubfs/Theme-2024/overlay-red.png featured image

By: RedLegg's Cyber Threat Intelligence Team

About:

RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide additional value to our customers. These emergency bulletins describe vulnerabilities or threats we classify as the highest severity level and warrant out-of-band emergency patching or mitigation action.


VULNERABILITIES

FortiSIEM OS Command Injection Vulnerability

 

CVSS Score: 9.8 (Critical)
Identifier: CVE-2025-25256
Exploit or POC Yes – Practical exploit code exists in the wild
Update CVE-2025-25256 – Fortinet Security Advisory

Description: CVE-2025-25256 is a severe command injection flaw in Fortinet FortiSIEM. An unauthenticated, remote attacker can exploit this vulnerability by sending specially crafted CLI requests that inject arbitrary operating system commands—without needing credentials or user interaction. Fortinet has confirmed that exploit code is circulating in the wild, heightening the risk of rapid and widespread abuse.

Affected Versions:

  • FortiSIEM 6.1 through 6.7.9
  • FortiSIEM 7.0.0 through 7.3.1

Older versions in the 5.x branch are also impacted

 

Mitigation Recommendation

Immediately upgrade to one of the patched versions:

  • FortiSIEM 6.7.10 or later
  • FortiSIEM 7.0.4 or later
  • FortiSIEM 7.1.8 or later
  • FortiSIEM 7.2.6 or later
  • FortiSIEM 7.3.2 or later

If updates cannot be applied immediately, restrict network access to the phMonitor port (TCP/7900) to trusted internal sources only.

Monitor logs for anomalous CLI usage indicative of command injection attempts.

Isolate FortiSIEM deployments from internet-facing segments and ensure monitoring systems are not compromised.