Fortinet

Fortinet

A critical **path traversal vulnerability (CVE pending)** in Fortinet’s **FortiWeb web application firewall (WAF)** is being actively exploited globally, allowing unauthenticated attackers to **create administrative accounts** on unpatched devices. The flaw, present in versions **8.0.1 and earlier**, enables threat actors to bypass authentication via a crafted HTTP POST request to the endpoint `/api/v2.0/cmdb/system/admin%3f/../../../../../cgi-bin/fwbcgi`. Attackers are automating mass scans and deploying preconfigured credentials (e.g., usernames like *Testpoint*, *trader1*; passwords like *3eMIXX43*, *AFT3$tH4ck*) to gain persistent admin access.Security researchers (**Defused, PwnDefend, watchTowr Labs**) confirm **widespread exploitation**, with IPs (e.g., *107.152.41.19*, *144.31.1.63*) linked to unauthorized account creation. While Fortinet released a patch (**8.0.2**) in late October, the lack of a public advisory or CVE assignment delays mitigation awareness. Organizations are urged to **immediately update**, audit admin accounts, block public access to management interfaces, and inspect logs for `fwbcgi` requests. The vulnerability serves as a **foothold for deeper network infiltration**, risking lateral movement into corporate environments if left unaddressed.

Source: https://dailysecurityreview.com/cyber-security/fortinet-fortiweb-vulnerability-exploited-to-create-unauthorized-admin-accounts/

Fortinet cybersecurity rating report: https://www.rankiteo.com/company/fortinet

"id": "FOR1532815111725",
"linkid": "fortinet",
"type": "Vulnerability",
"date": "10/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'Unknown (all organizations '
                                              'using unpatched FortiWeb 8.0.1 '
                                              'or earlier)',
                        'industry': 'Cybersecurity',
                        'location': 'Global',
                        'name': 'Fortinet',
                        'size': 'Large Enterprise',
                        'type': 'Vendor'}],
 'attack_vector': ['Network', 'Exploit Public-Facing Application'],
 'customer_advisories': ['Fortinet customers advised to update to 8.0.2 and '
                         'check for unauthorized accounts'],
 'date_detected': '2024-10-01T00:00:00Z',
 'date_publicly_disclosed': '2024-10-01T00:00:00Z',
 'description': 'A recently uncovered path traversal vulnerability in '
                'Fortinet’s FortiWeb web application firewall (CVE not yet '
                'assigned) is being exploited globally. Attackers are creating '
                'new administrative accounts on unpatched devices without '
                'authentication. The flaw, fixed in FortiWeb 8.0.2, was first '
                'observed in early October 2024. Exploitation involves sending '
                'crafted HTTP POST requests to the endpoint '
                '`/api/v2.0/cmdb/system/admin%3f/../../../../../cgi-bin/fwbcgi`, '
                'bypassing authentication to generate admin-level accounts. '
                "Observed malicious usernames include 'Testpoint', 'trader1', "
                "and 'trader', with passwords like '3eMIXX43' and "
                "'AFT3$tH4ckmet0d4yaga!n'. Attacks are automated, originating "
                'from IPs such as 107.152.41.19, 144.31.1.63, and blocks '
                'within 185.192.70.0/24. Security firms (PwnDefend, Defused, '
                'watchTowr Labs, Rapid7) confirmed the exploit and urged '
                'immediate patching (to 8.0.2) and system reviews for '
                'unauthorized accounts.',
 'impact': {'brand_reputation_impact': ['Potential reputational damage for '
                                        'Fortinet and affected organizations'],
            'operational_impact': ['Potential unauthorized administrative '
                                   'access',
                                   'Risk of lateral movement into corporate '
                                   'networks'],
            'systems_affected': ['FortiWeb appliances (unpatched versions)']},
 'initial_access_broker': {'backdoors_established': ['Unauthorized admin '
                                                     'accounts (e.g., '
                                                     "'Testpoint', 'trader1')"],
                           'entry_point': 'Path traversal vulnerability in '
                                          '`/api/v2.0/cmdb/system/admin%3f/../../../../../cgi-bin/fwbcgi`',
                           'high_value_targets': ['FortiWeb management '
                                                  'interfaces',
                                                  'Corporate networks '
                                                  '(potential lateral '
                                                  'movement)'],
                           'reconnaissance_period': 'Observed since early '
                                                    'October 2024'},
 'investigation_status': 'Ongoing (active exploitation confirmed; patch '
                         'available)',
 'lessons_learned': ['Critical importance of timely patching for publicly '
                     'exposed devices',
                     'Need for continuous monitoring of administrative account '
                     'changes',
                     'Risks of automated mass exploitation for unpatched '
                     'vulnerabilities',
                     'Value of third-party research in identifying and '
                     'mitigating zero-day threats'],
 'motivation': ['Unauthorized Access',
                'Lateral Movement',
                'Potential Foothold for Further Attacks'],
 'post_incident_analysis': {'corrective_actions': ['Patch management process '
                                                   'review',
                                                   'Enhanced monitoring of '
                                                   'administrative account '
                                                   'changes',
                                                   'Restriction of management '
                                                   'interface access',
                                                   'Proactive vulnerability '
                                                   'scanning for exposed '
                                                   'devices'],
                            'root_causes': ['Unpatched path traversal '
                                            'vulnerability in FortiWeb',
                                            'Public exposure of management '
                                            'interfaces',
                                            'Lack of timely vendor advisory '
                                            '(no CVE assigned as of '
                                            'disclosure)']},
 'recommendations': ['Immediately patch FortiWeb to version 8.0.2 or later',
                     'Audit all administrative accounts for unauthorized '
                     'entries',
                     'Restrict management interface access to trusted '
                     'networks/VPNs',
                     'Monitor logs for suspicious activity (e.g., requests to '
                     '`fwbcgi`)',
                     'Assume compromise if running vulnerable versions and '
                     'investigate thoroughly',
                     'Use artifact-generation tools (e.g., from watchTowr '
                     'Labs) to detect vulnerable systems'],
 'references': [{'date_accessed': '2024-10-01T00:00:00Z',
                 'source': 'PwnDefend & Defused Research Team Analysis'},
                {'date_accessed': '2024-10-01T00:00:00Z',
                 'source': 'watchTowr Labs Exploit Confirmation'},
                {'date_accessed': '2024-10-01T00:00:00Z',
                 'source': 'Rapid7 Vulnerability Testing Report'}],
 'response': {'communication_strategy': ['Security advisories from researchers '
                                         '(PwnDefend, watchTowr Labs)',
                                         'Media reports urging immediate '
                                         'action'],
              'containment_measures': ['Update to FortiWeb 8.0.2',
                                       'Review administrative user lists for '
                                       'unexpected accounts',
                                       'Inspect logs for requests to `fwbcgi` '
                                       'path',
                                       'Block public internet access to '
                                       'management interfaces',
                                       'Restrict access to trusted networks or '
                                       'VPN-only channels'],
              'enhanced_monitoring': ['Log inspection for `fwbcgi` endpoint '
                                      'activity'],
              'incident_response_plan_activated': True,
              'network_segmentation': ['Restrict management interface access'],
              'remediation_measures': ['Apply firmware patch (8.0.2)',
                                       'Remove unauthorized admin accounts'],
              'third_party_assistance': ['PwnDefend',
                                         'Defused Research Team',
                                         'watchTowr Labs',
                                         'Rapid7']},
 'stakeholder_advisories': ['Urgent patching and system review recommended for '
                            'all FortiWeb users'],
 'threat_actor': ['Unknown (Automated Mass Scanning)', 'Multiple Attackers'],
 'title': 'Global Exploitation of Path Traversal Vulnerability in Fortinet '
          'FortiWeb Web Application Firewall',
 'type': ['Unauthorized Access',
          'Path Traversal Vulnerability',
          'Privilege Escalation',
          'Account Takeover'],
 'vulnerability_exploited': {'affected_versions': ['FortiWeb 8.0.1 and '
                                                   'earlier'],
                             'description': 'Path traversal flaw in '
                                            '`/api/v2.0/cmdb/system/admin%3f/../../../../../cgi-bin/fwbcgi` '
                                            'allowing unauthenticated admin '
                                            'account creation via crafted HTTP '
                                            'POST requests.',
                             'name': 'FortiWeb Path Traversal Vulnerability '
                                     '(Unassigned CVE)',
                             'patched_version': '8.0.2',
                             'severity': 'Critical'}}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.