Plattform
fortinet
Komponente
fortios
Behoben in
7.6.4
7.4.9
7.2.13
7.0.19
6.4.17
6.2.18
6.0.19
25.3.1
CVE-2025-58413 represents a stack-based buffer overflow vulnerability discovered in FortiOS, Fortinet’s firewall operating system. Successful exploitation allows an attacker to execute arbitrary code or commands on the affected system, potentially leading to complete system compromise. This vulnerability affects FortiOS versions 6.0 through 25.3.b, as well as FortiSASE 25.3.b, and has been published on November 18, 2025.
The impact of CVE-2025-58413 is significant due to the potential for remote code execution. An attacker who successfully exploits this vulnerability can gain complete control over the affected FortiOS device, including the ability to modify firewall rules, steal sensitive data, and pivot to other systems on the network. The ability to execute arbitrary commands allows for a wide range of malicious activities, including data exfiltration, denial-of-service attacks, and the installation of persistent backdoors. Given FortiOS's role as a critical network security component, a successful compromise could have a broad blast radius, impacting the entire organization. The vulnerability's nature, a buffer overflow, suggests a potential for denial-of-service conditions as well, further disrupting network operations.
CVE-2025-58413 was published on November 18, 2025. The EPSS score is pending evaluation, but the nature of a buffer overflow vulnerability suggests a potentially high probability of exploitation, especially if a public proof-of-concept (POC) is released. As of the publication date, no public POCs are known. The vulnerability is not currently listed on KEV, but this may change. Monitor NVD and CISA advisories for updates and potential exploitation campaigns.
Exploit-Status
EPSS
0.01% (0% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-58413 is to upgrade to a patched version of FortiOS as soon as possible. Fortinet has not yet released a fixed version as of the publication date. Until a patch is available, consider implementing temporary workarounds to reduce the attack surface. These may include restricting access to the vulnerable services, implementing strict input validation on network traffic, and deploying a Web Application Firewall (WAF) or reverse proxy to filter malicious packets. Monitor network traffic for suspicious patterns indicative of exploitation attempts. If a rollback to a previous, known-good version is possible, this can provide an immediate, albeit temporary, solution. After upgrading, verify the fix by attempting to reproduce the vulnerability using known attack vectors and confirming that the overflow is no longer triggered.
Actualizar FortiOS a una versión corregida. Consulte el advisory de Fortinet para obtener la versión específica a la que debe actualizar.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
It's a medium-severity buffer overflow vulnerability in FortiOS, allowing attackers to execute code via crafted packets.
If you are running FortiOS 6.0 through 25.3.b, or FortiSASE 25.3.b, you are potentially affected. Check your version and apply updates.
Upgrade to a patched version of FortiOS as soon as it becomes available. Until then, implement temporary workarounds like restricting access and using a WAF.
As of November 18, 2025, no public exploitation is known, but the vulnerability's nature suggests a potential for exploitation.
Refer to the Fortinet security advisory (when released) and the National Vulnerability Database (NVD) entry for CVE-2025-58413.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.