FortiOS Buffer Overflow Vulnerability Allows Attackers to Execute Arbitrary Code

Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. With a CVSSv3 score of 4.0, the vulnerability is rated as medium severity, yet its potential impact, escalation of privilege, poses a serious risk to affected systems. This heap-based buffer overflow vulnerability, classified under CWE-122, affects the cw_stad daemon and could enable an authenticated attacker to execute arbitrary code or commands through specially crafted requests. The vulnerability impacts specific versions of FortiOS, with Fortinet providing clear upgrade paths to mitigate the risk. This vulnerability was internally discovered and reported by Gwendal Guégniaud of the Fortinet Product Security team. Their proactive identification of the flaw affecting a component categorized as “OTHERS,” highlights Fortinet’s commitment to maintaining the security of its products. Fortinet disclosed a significant security flaw in its FortiOS operating system, identified as CVE-2025-24477. While the CVSSv3 score indicates a medium severity level, the ability for an authenticated attacker to escalate privileges through arbitrary code execution is a critical concern. Fortinet advises users to follow the recommended upgrade path using their official tool for a seamless transition to secure versions. Fortinet’s swift response in providing patches and detailed guidance reflects the ongoing challenges in cybersecurity, where even medium-severity vulnerabilities can have significant consequences if exploited. Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. This could potentially lead to unauthorized access or control over affected systems, compromising network security. This vulnerability, tracked under IR number FG-IR-25-026, underscores the importance of timely updates to safeguard network infrastructure. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications. Organizations using these models in the specified configuration should prioritize applying the necessary updates to prevent potential exploitation. The initial publication of this issue on July 8, 2025, marks the beginning of Fortinet’s efforts to inform and protect its user base from this threat.

This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 08 Jul 2025 15:35:11 +0000


Cyber News related to FortiOS Buffer Overflow Vulnerability Allows Attackers to Execute Arbitrary Code

FortiOS SSL VPN Zero-day Vulnerability - A newly reported zero-day vulnerability in FortiOS SSL VPN has been identified as a possible risk for users. The vulnerability, which is tracked as CVE-2018-13379, was discovered by researchers from Positive Technologies and is rated as “High” ...
2 years ago Securityaffairs.com
New Chinese 0-Day Discovered By HackRead: Backdoor in FortiOS - A new 0-day has been discovered by HackRead that affects Fortinet FortiOS. The backdoor, which has not yet been patched, enables malicious actors to gain access to the systems that are running Fortinet FortiOS. This is a serious security breach and ...
2 years ago Hackread.com
CVE-2023-36641 - A numeric truncation error in Fortinet FortiProxy version 7.2.0 through 7.2.4, FortiProxy version 7.0.0 through 7.0.10, FortiProxy 2.0 all versions, FortiProxy 1.2 all versions, FortiProxy 1.1, all versions, FortiProxy 1.0 all versions, FortiOS ...
1 year ago
CVE-2023-22641 - A url redirection to untrusted site ('open redirect') in Fortinet FortiOS version 7.2.0 through 7.2.3, FortiOS version 7.0.0 through 7.0.9, FortiOS versions 6.4.0 through 6.4.12, FortiOS all versions 6.2, FortiOS all versions 6.0, FortiProxy ...
2 years ago
CVE-2023-22640 - A out-of-bounds write in Fortinet FortiOS version 7.2.0 through 7.2.3, FortiOS version 7.0.0 through 7.0.10, FortiOS version 6.4.0 through 6.4.11, FortiOS version 6.2.0 through 6.2.13, FortiOS all versions 6.0, FortiProxy version 7.2.0 through ...
2 years ago
CVE-2023-22639 - A out-of-bounds write in Fortinet FortiOS version 7.2.0 through 7.2.3, FortiOS version 7.0.0 through 7.0.10, FortiOS version 6.4.0 through 6.4.12, FortiOS all versions 6.2, FortiOS all versions 6.0, FortiProxy version 7.2.0 through 7.2.2, FortiProxy ...
2 years ago
CVE-2023-33305 - A loop with unreachable exit condition ('infinite loop') in Fortinet FortiOS version 7.2.0 through 7.2.4, FortiOS version 7.0.0 through 7.0.10, FortiOS 6.4 all versions, FortiOS 6.2 all versions, FortiOS 6.0 all versions, FortiProxy version ...
2 years ago
Fortinet Warns of New FortiOS Zero-Day - Fortinet on Thursday announced patches for a critical remote code execution vulnerability in FortiOS that may have been exploited in the wild. The security hole, tracked as CVE-2024-21762, impacts FortiOS versions 6.0, 6.2, 6.4, 7.0, 7.2 and 7.4. ...
1 year ago Securityweek.com CVE-2024-21762 CVE-2022-42475 CVE-2023-27997 CVE-2024-23113 Volt Typhoon
FortiOS Buffer Overflow Vulnerability Allows Attackers to Execute Arbitrary Code - Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. With a CVSSv3 score of 4.0, the vulnerability is rated as medium severity, yet its potential impact, escalation of privilege, ...
4 months ago Cybersecuritynews.com CVE-2025-24477
CVE-2023-46217 - Multiple vulnerabilities exist in Ivanti Avalanche v6.4.1 WLAvalancheService.exe.CVE-2023-41727 - MuProperty type 100 stack-based buffer overflow (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)A message sent to WLAvalancheService.exe on TCP port 1777 ...
1 year ago Tenable.com
CVE-2023-46216 - Multiple vulnerabilities exist in Ivanti Avalanche v6.4.1 WLAvalancheService.exe.CVE-2023-41727 - MuProperty type 100 stack-based buffer overflow (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)A message sent to WLAvalancheService.exe on TCP port 1777 ...
1 year ago Tenable.com
CVE-2023-41727 - Multiple vulnerabilities exist in Ivanti Avalanche v6.4.1 WLAvalancheService.exe.CVE-2023-41727 - MuProperty type 100 stack-based buffer overflow (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)A message sent to WLAvalancheService.exe on TCP port 1777 ...
1 year ago Tenable.com
New Fortinet RCE flaw in SSL VPN likely exploited in attacks - Fortinet is warning that a new critical remote code execution vulnerability in FortiOS SSL VPN is potentially being exploited in attacks. The flaw received a 9.6 severity rating and is an out-of-bounds write vulnerability in FortiOS that allows ...
1 year ago Bleepingcomputer.com CVE-2024-23113 CVE-2023-44487 CVE-2023-47537 CVE-2024-21762 Volt Typhoon
CISA warns Fortinet zero-day vulnerability under attack - CISA urged users to address two critical Fortinet vulnerabilities in products that are commonly targeted by the Chinese nation-state threat group Volt Typhoon, and one flaw is already being exploited in the wild. Fortinet published two separate ...
1 year ago Techtarget.com CVE-2024-21762 CVE-2024-22024 CVE-2023-27997 CVE-2024-23113 Volt Typhoon
CVE-2022-43953 - A use of externally-controlled format string in Fortinet FortiOS version 7.2.0 through 7.2.4, FortiOS all versions 7.0, FortiOS all versions 6.4, FortiOS all versions 6.2, FortiProxy version 7.2.0 through 7.2.1, FortiProxy version 7.0.0 through 7.0.7 ...
2 years ago
CVE-2022-22299 - A format string vulnerability [CWE-134] in the command line interpreter of FortiADC version 6.0.0 through 6.0.4, FortiADC version 6.1.0 through 6.1.5, FortiADC version 6.2.0 through 6.2.1, FortiProxy version 1.0.0 through 1.0.7, FortiProxy version ...
3 years ago
CVE-2021-44171 - A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiOS version 6.0.0 through 6.0.14, FortiOS version 6.2.0 through 6.2.10, FortiOS version 6.4.0 through 6.4.8, FortiOS version 7.0.0 ...
3 years ago
Fortinet: APTs Exploiting FortiOS Vulnerabilities in Critical Infrastructure Attacks - Fortinet warned organizations on Wednesday that APTs linked to China and other countries have been exploiting two known FortiOS vulnerabilities in attacks aimed at various sectors, including critical infrastructure. One of the exploited ...
1 year ago Securityweek.com CVE-2022-42475 CVE-2023-27997 APT1 APT3 Volt Typhoon
New Fortinet RCE bug is actively exploited, CISA confirms - CISA confirmed today that attackers are actively exploiting a critical remote code execution bug patched by Fortinet on Thursday. The flaw is due to an out-of-bounds write weakness in the FortiOS operating system that can let unauthenticated ...
1 year ago Bleepingcomputer.com CVE-2023-34992 Volt Typhoon
Microsoft security bypass bug said to be under exploit The Register - Patch Tuesday Microsoft fixed 149 security flaws in its own products this week, and while Redmond acknowledged one of those vulnerabilities is being actively exploited, we've been told another hole is under attack, too. The bug the IT giant said was ...
1 year ago Go.theregister.com CVE-2024-26234 CVE-2024-29988 CVE-2024-21322 CVE-2023-48784 CVE-2024-23662 CVE-2024-22246
Hackers Allegedly Selling FortiGate 0-Day Exploit Impacting Firewalls - The exploit claims to enable unauthenticated remote code execution (RCE) and full configuration access to FortiOS, allowing attackers to seize control of vulnerable devices without needing credentials. The company has also released advisories ...
7 months ago Cybersecuritynews.com CVE-2024-55591
Exploitation activity increasing on Fortinet vulnerability - Exploitation activity appears to be ramping up against a critical Fortinet vulnerability that was disclosed and patched last month. In a security advisory on Feb. 8, Fortinet detailed a zero-day vulnerability in FortiOS, tracked as CVE-2024-21762 or ...
1 year ago Techtarget.com CVE-2024-21762 CVE-2024-27162
CISA Warns of Fortinet FortiOS Authentication Bypass Vulnerability - “An Authentication Bypass Using an Alternate Path or Channel vulnerability affecting FortiOS and FortiProxy may allow a remote attacker to gain super-admin privileges via crafted CSF proxy requests,” states the Fortinet advisory. The ...
8 months ago Cybersecuritynews.com CVE-2025-24472
CVE-2015-8311 - On 2015-09-14, Marcello Duarte disclosed a vulnerability in FreeSWITCH on the Bugtraq mail list. This was assigned CVE-2015-7392 which reads: Heap-based buffer overflow in the parse_string function in libs/esl/src/esl_json.c in FreeSWITCH before ...
55 years ago Tenable.com