Fortinet

Fortinet

Fortinet faced criticism for silently patching **two zero-day vulnerabilities** in its **FortiWeb web application firewall (WAF)** without adequately informing customers. The first, **CVE-2025-64446 (FG-IR-25-910)**, disclosed on **November 14**, is a **critical** flaw (CVSS 9.4) combining **path traversal** and **authentication bypass** weaknesses in the GUI. The second, **CVE-2025-58034 (FG-IR-25-513)**, revealed **four days later**, is part of the same attack chain. Both vulnerabilities were exploited in the wild before public disclosure, exposing organizations to **unauthorized access, data breaches, or system compromise**.The lack of transparency erodes trust, as customers were left unaware of active exploitation risks. While no **direct data theft or financial loss** was confirmed in the article, the **critical severity of the flaws**—particularly the authentication bypass—poses a **high risk of system takeover, lateral movement, or follow-on attacks** (e.g., ransomware, data exfiltration). The silent patching approach undermines incident response preparedness, potentially allowing threat actors to maintain persistence in compromised environments. The reputational damage from **poor vulnerability disclosure practices** further compounds the impact, as security researchers and customers question Fortinet’s commitment to transparency and proactive risk communication.

Source: https://www.csoonline.com/article/4093949/fortinet-criticized-for-silent-patching-after-disclosing-second-zero-day-vulnerability-in-same-equipment.html

Fortinet cybersecurity rating report: https://www.rankiteo.com/company/fortinet

"id": "FOR1102211112125",
"linkid": "fortinet",
"type": "Vulnerability",
"date": "11/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization’s existence"
{'affected_entities': [{'industry': 'Cybersecurity',
                        'name': 'Fortinet',
                        'type': 'Corporation'}],
 'attack_vector': ['Path traversal (CVE-2025-64446)',
                   'Authentication bypass (CVE-2025-64446)'],
 'date_publicly_disclosed': ['2025-11-14', '2025-11-18'],
 'description': 'Fortinet was criticized for silently patching two zero-day '
                'vulnerabilities in its FortiWeb web application firewall '
                'without informing customers. The vulnerabilities, '
                'CVE-2025-64446 (critical, CVSS 9.4) and CVE-2025-58034, were '
                'disclosed on November 14 and November 18, respectively. '
                'CVE-2025-64446 includes a path traversal flaw and an '
                'authentication bypass weakness, both part of the same attack '
                'chain.',
 'impact': {'brand_reputation_impact': 'Criticism for silent patching without '
                                       'customer notification',
            'systems_affected': ['FortiWeb web application firewall']},
 'lessons_learned': 'Transparency in vulnerability disclosure and patching is '
                    'critical to maintain customer trust and security posture.',
 'post_incident_analysis': {'root_causes': ['Silent patching of zero-day '
                                            'vulnerabilities without customer '
                                            'notification',
                                            'Lack of transparency in '
                                            'vulnerability management']},
 'recommendations': ['Improve communication with customers regarding '
                     'vulnerability patches and potential risks.',
                     'Conduct thorough audits of patching processes to ensure '
                     'compliance with best practices for transparency.'],
 'response': {'remediation_measures': ['Silent patching of vulnerabilities '
                                       '(criticized for lack of '
                                       'transparency)']},
 'title': 'Fortinet FortiWeb Zero-Day Vulnerabilities Exploited in Attack '
          'Chain',
 'type': ['Zero-day exploitation', 'Vulnerability disclosure'],
 'vulnerability_exploited': ['CVE-2025-64446 (FG-IR-25-910)',
                             'CVE-2025-58034 (FG-IR-25-513)']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.