A stack-based buffer overflow vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions, FortiOS
翻訳中…プラットフォーム
fortinet
コンポーネント
fortios
修正版
7.6.4
7.4.9
7.2.13
7.0.19
6.4.17
6.2.18
6.0.19
25.3.1
CVE-2025-58413 represents a stack-based buffer overflow vulnerability discovered in FortiOS, Fortinet’s firewall operating system. Successful exploitation allows an attacker to execute arbitrary code or commands on the affected system, potentially leading to complete system compromise. This vulnerability affects FortiOS versions 6.0 through 25.3.b, as well as FortiSASE 25.3.b, and has been published on November 18, 2025.
影響と攻撃シナリオ翻訳中…
The impact of CVE-2025-58413 is significant due to the potential for remote code execution. An attacker who successfully exploits this vulnerability can gain complete control over the affected FortiOS device, including the ability to modify firewall rules, steal sensitive data, and pivot to other systems on the network. The ability to execute arbitrary commands allows for a wide range of malicious activities, including data exfiltration, denial-of-service attacks, and the installation of persistent backdoors. Given FortiOS's role as a critical network security component, a successful compromise could have a broad blast radius, impacting the entire organization. The vulnerability's nature, a buffer overflow, suggests a potential for denial-of-service conditions as well, further disrupting network operations.
悪用の状況翻訳中…
CVE-2025-58413 was published on November 18, 2025. The EPSS score is pending evaluation, but the nature of a buffer overflow vulnerability suggests a potentially high probability of exploitation, especially if a public proof-of-concept (POC) is released. As of the publication date, no public POCs are known. The vulnerability is not currently listed on KEV, but this may change. Monitor NVD and CISA advisories for updates and potential exploitation campaigns.
脅威インテリジェンス
エクスプロイト状況
EPSS
0.01% (0% パーセンタイル)
CISA SSVC
CVSS ベクトル
これらのメトリクスの意味は?
- Attack Vector
- 隣接 — 同一LAN・Bluetooth・ローカル無線セグメントへの近接が必要。
- Attack Complexity
- 高 — 競合条件、非標準設定、または特定の状況が必要。悪用が難しい。
- Privileges Required
- なし — 認証不要。資格情報なしで悪用可能。
- User Interaction
- なし — 自動かつ無音の攻撃。被害者は何もしない。
- Scope
- 変化なし — 影響は脆弱なコンポーネントのみ。
- Confidentiality
- 高 — 機密性の完全喪失。全データが読み取り可能。
- Integrity
- 高 — 任意のデータの書き込み・変更・削除が可能。
- Availability
- 高 — 完全なクラッシュまたはリソース枯渇。完全なサービス拒否。
影響を受けるソフトウェア
弱点分類 (CWE)
タイムライン
- 予約済み
- 公開日
- 更新日
- EPSS 更新日
緩和策と回避策翻訳中…
The primary mitigation for CVE-2025-58413 is to upgrade to a patched version of FortiOS as soon as possible. Fortinet has not yet released a fixed version as of the publication date. Until a patch is available, consider implementing temporary workarounds to reduce the attack surface. These may include restricting access to the vulnerable services, implementing strict input validation on network traffic, and deploying a Web Application Firewall (WAF) or reverse proxy to filter malicious packets. Monitor network traffic for suspicious patterns indicative of exploitation attempts. If a rollback to a previous, known-good version is possible, this can provide an immediate, albeit temporary, solution. After upgrading, verify the fix by attempting to reproduce the vulnerability using known attack vectors and confirming that the overflow is no longer triggered.
修正方法翻訳中…
Actualizar FortiOS a una versión corregida. Consulte el advisory de Fortinet para obtener la versión específica a la que debe actualizar.
CVEセキュリティニュースレター
脆弱性分析と重要アラートをメールでお届けします。
よくある質問翻訳中…
What is CVE-2025-58413 — Buffer Overflow in FortiOS?
It's a medium-severity buffer overflow vulnerability in FortiOS, allowing attackers to execute code via crafted packets.
Am I affected by CVE-2025-58413 in FortiOS?
If you are running FortiOS 6.0 through 25.3.b, or FortiSASE 25.3.b, you are potentially affected. Check your version and apply updates.
How do I fix CVE-2025-58413 in FortiOS?
Upgrade to a patched version of FortiOS as soon as it becomes available. Until then, implement temporary workarounds like restricting access and using a WAF.
Is CVE-2025-58413 being actively exploited?
As of November 18, 2025, no public exploitation is known, but the vulnerability's nature suggests a potential for exploitation.
Where can I find the official FortiOS advisory for CVE-2025-58413?
Refer to the Fortinet security advisory (when released) and the National Vulnerability Database (NVD) entry for CVE-2025-58413.