Critical Authentication Bypass Vulnerability in FortiPAM and FortiSwitch Manager Exposes Systems to Remote Attacks

Fortinet, a leading cybersecurity solutions provider, has issued an urgent advisory regarding a critical vulnerability in its FortiPAM and FortiSwitch Manager products. This flaw, identified as CVE-2025-49201, allows attackers to bypass authentication mechanisms through brute-force methods, potentially granting unauthorized access to affected systems.

Vulnerability Overview

CVE-2025-49201 is rooted in a weak authentication mechanism within the Web Application Delivery (WAD) and Graphical User Interface (GUI) components of FortiPAM and FortiSwitch Manager. Classified under CWE-1390, this vulnerability has been assigned a CVSS v3.1 score of 7.4, indicating a high severity level. Exploitation of this flaw could enable remote attackers to execute arbitrary code or commands, leading to full control over compromised devices.

Affected Products and Versions

The vulnerability impacts multiple versions of FortiPAM, Fortinet’s privileged access management solution, and specific releases of FortiSwitch Manager, which is responsible for network switch configurations.

FortiPAM:

– Versions Affected:
– 1.5.0
– 1.4.0 through 1.4.2
– All versions of 1.3, 1.2, 1.1, and 1.0

– Recommended Actions:
– Users on version 1.5.0 should upgrade to 1.5.1 or later.
– Users on versions 1.4.0 through 1.4.2 should upgrade to 1.4.3 or later.
– Users on versions 1.3 and below should migrate to a fixed release.

FortiSwitch Manager:

– Versions Affected:
– 7.2.0 through 7.2.4

– Recommended Actions:
– Users should upgrade to version 7.2.5 or later.

Notably, FortiPAM versions 1.7 and 1.6, as well as FortiSwitch Manager version 7.0, are not affected by this vulnerability.

Potential Impact

Exploitation of CVE-2025-49201 requires network access and can be achieved through persistent brute-force attempts. While no public exploits have been reported to date, the nature of the vulnerability underscores the importance of proactive mitigation measures.

Mitigation Measures

Fortinet strongly advises all users of the affected versions to apply the necessary updates immediately to mitigate potential threats. In addition to upgrading to the recommended versions, organizations should:

– Monitor for Unusual Login Attempts: Regularly review authentication logs for signs of unauthorized access or repeated failed login attempts.

– Implement Multi-Factor Authentication (MFA): Enhance security by requiring multiple forms of verification before granting access, thereby reducing the risk of unauthorized entry.

Discovery and Disclosure

The vulnerability was internally discovered by Gwendal Guégniaud from Fortinet’s Product Security team. Fortinet publicly disclosed the issue on October 14, 2025, under internal reference FG-IR-25-010.

Broader Context

This disclosure comes amid increasing concerns over supply chain attacks targeting network management tools. The critical nature of CVE-2025-49201 highlights the necessity for swift updates and vigilant security practices within enterprise environments.

Conclusion

Organizations utilizing FortiPAM and FortiSwitch Manager must prioritize the application of the recommended patches to safeguard their systems against potential exploitation. By staying informed and implementing robust security measures, businesses can better protect their networks from emerging threats.