Emergency Security Bulletin: Improper Verification of Cryptographic Signature in Fortinet Products

featured image

By: RedLegg's Cyber Threat Intelligence Team

About:

CVE-2025-10573 is a critical stored cross-site scripting (XSS) vulnerability in Ivanti Endpoint Manager (EPM) caused by improper input neutralization within the web console interface. An unauthenticated attacker can submit crafted payloads (e.g., via device registration fields or data submission forms) that inject malicious JavaScript into stored values. When an administrator views the affected page, the attacker-controlled script executes in the admin context, enabling session hijacking, unauthorized actions, configuration manipulation, or takeover of administrator accounts.

RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide additional value to our customers. These emergency bulletins describe vulnerabilities or threats we classify as the highest severity level and warrant out-of-band emergency patching or mitigation action.


VULNERABILITIES

Improper Verification of Cryptographic Signature in Fortinet Products


CVSS Score: 9.6 (Critical)
Identifier: CVE-2025-59718, CVE-2025-59719
Exploit or Proof of Concept (PoC): There is currently no public proof-of-concept and no confirmed in-the-wild exploitation reported by Fortinet.
Update: 

Fortinet PSIRT Advisory:
https://www.fortiguard.com/psirt/FG-IR-25-647

Affected versions and required upgrades:

  • FortiOS 7.6: affected versions 7.6.0 through 7.6.3 → upgrade to 7.6.4 or above
  • FortiOS 7.4: affected versions 7.4.0 through 7.4.8 → upgrade to 7.4.9 or above
  • FortiOS 7.2: affected versions 7.2.0 through 7.2.11 → upgrade to 7.2.12 or above
  • FortiOS 7.0: affected versions 7.0.0 through 7.0.17 → upgrade to 7.0.18 or above
  • FortiOS 6.4: not affected
  • FortiProxy 7.6: affected versions 7.6.0 through 7.6.3 → upgrade to 7.6.4 or above
  • FortiProxy 7.4: affected versions 7.4.0 through 7.4.10 → upgrade to 7.4.11 or above
  • FortiProxy 7.2: affected versions 7.2.0 through 7.2.14 → upgrade to 7.2.15 or above
  • FortiProxy 7.0: affected versions 7.0.0 through 7.0.21 → upgrade to 7.0.22 or above
  • FortiSwitchManager 7.2: affected versions 7.2.0 through 7.2.6 → upgrade to 7.2.7 or above
  • FortiSwitchManager 7.0: affected versions 7.0.0 through 7.0.5 → upgrade to 7.0.6 or above
  • FortiWeb 8.0: affected version 8.0.0 → upgrade to 8.0.1 or above
  • FortiWeb 7.6: affected versions 7.6.0 through 7.6.4 → upgrade to 7.6.5 or above
  • FortiWeb 7.4: affected versions 7.4.0 through 7.4.9 → upgrade to 7.4.10 or above
  • FortiWeb 7.2: not affected
  • FortiWeb 7.0: not affected
 

Description:  

CVE-2025-59718 and CVE-2025-59719 is an Improper Verification of Cryptographic Signature vulnerability.
This means that certain Fortinet products incorrectly validate cryptographic signatures applied to files, components, or update mechanisms. As a result, an attacker who can manipulate the signed data or influence validation paths may be able to bypass integrity checks, load unauthorized or tampered files, or undermine the trust chain that protects core system operations.
 

Mitigation Recommendation:   

Apply vendor-provided fixes immediately for all affected Fortinet devices.
 
Identify devices running FortiOS, FortiProxy, FortiSwitchManager, and FortiWeb that match vulnerable version ranges.
 
Restrict administrative access to trusted networks until patches are deployed.
 
Monitor device logs and update workflows for unusual behavior, especially failed or unexpected signature verification events.