- Description
- Use of a hard-coded cryptographic key to cipher sensitive data in FortiOS configuration backup file may allow an attacker with access to the backup file to decipher the sensitive data, via knowledge of the hard-coded key. The aforementioned sensitive data includes users' passwords (except the administrator's password), private keys' passphrases and High Availability password (when set).
- Source
- psirt@fortinet.com
- NVD status
- Analyzed
- Products
- fortios
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:N/A:N
Data from CISA
- Vulnerability name
- Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability
- Exploit added on
- Jun 25, 2025
- Exploit action due
- Jul 16, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Hype score
- Not currently trending
Ransomware vulns with highest exploit likelihood ⬆️ (past 30d): - CVE-2025-53770 (SharePoint..) +3700.00% - CVE-2019-6693 (FortiOS..) +159.30% - CVE-2019-5591 (FortiOS..) +44.14% - CVE-2024-42057 (Zyxel Firewall..) +33.61% - CVE-2018-13374 (FortiOS..) +30.01%
@DefusedCyber
23 Jul 2025
1200 Impressions
2 Retweets
9 Likes
3 Bookmarks
0 Replies
1 Quote
🛡️ We added Fortinet FortiOS, D-Link DIR-859 Router, & AMI MegaRAC SPx vulnerabilities CVE-2019-6693, CVE-2024-0769, & CVE-2024-54085 to our Known Exploited Vulnerabilities Catalog. Visit https://t.co/myxOwap1Tf & apply mitigations to protect against cyberattacks
@CISACyber
25 Jun 2025
7061 Impressions
20 Retweets
51 Likes
9 Bookmarks
2 Replies
3 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DBDD29F8-B339-4C3B-AF3F-77BB3D323D1D",
"versionEndIncluding": "5.6.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8FA4CED9-EAB9-4FE4-B058-CC4D3E03C520",
"versionEndIncluding": "6.0.6",
"versionStartIncluding": "6.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fortinet:fortios:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "72C437B7-75F8-4DDC-9670-19E2C21ACB27",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]