Urgent Alert: FortiWeb WAF Vulnerability CVE-2025-64446 Exploited in Active Attacks; Immediate Patch Advised

Critical FortiWeb WAF Vulnerability Exploited in Active Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding a critical vulnerability in Fortinet’s FortiWeb Web Application Firewall (WAF). This flaw, identified as CVE-2025-64446, is actively being exploited by threat actors to gain administrative control over affected systems.

Understanding CVE-2025-64446

CVE-2025-64446 is a relative path traversal vulnerability (CWE-23) present in multiple versions of FortiWeb. This security flaw allows unauthenticated attackers to execute arbitrary administrative commands by sending specially crafted HTTP or HTTPS requests. The vulnerability affects FortiWeb versions up to 7.4.7 and 7.6.5.

Implications of the Vulnerability

Exploitation of this vulnerability can lead to complete system compromise, unauthorized data access, and potential deployment of malware. While there is no confirmed link to ransomware campaigns, real-world exploitation has been observed, particularly targeting sectors such as finance and healthcare.

Technical Details

The vulnerability arises from improper handling of file paths within the FortiWeb management interface. By manipulating the file path, attackers can bypass authentication mechanisms and execute commands with administrative privileges. This type of flaw is particularly dangerous as it allows remote code execution without requiring prior authentication.

Mitigation Measures

Fortinet has released patches to address this vulnerability. Users are strongly advised to update their FortiWeb devices to the latest versions, such as 7.4.8 or 7.6.6. Additionally, restricting administrative access through network segmentation can help mitigate potential exploitation.

Recommendations for Organizations

1. Immediate Patching: Apply the latest security updates provided by Fortinet to remediate the vulnerability.

2. Access Control: Restrict administrative access to FortiWeb devices by implementing network segmentation and limiting exposure to the internet.

3. Monitoring: Continuously monitor network traffic and system logs for unusual activities that may indicate exploitation attempts.

4. Incident Response: Develop and maintain an incident response plan to address potential breaches promptly.

Conclusion

The active exploitation of CVE-2025-64446 underscores the critical importance of timely vulnerability management and proactive security measures. Organizations utilizing FortiWeb WAFs must prioritize patching and implement robust access controls to safeguard their systems against potential attacks.