CVE-2025-53843
FortiOS Schwachstellenanalyse und -minderung

Überblick

CVE-2025-53843 is a stack-based buffer overflow vulnerability discovered in the CAPWAP daemon of Fortinet FortiOS. The vulnerability affects multiple versions including FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, and all versions of FortiOS 7.2, 7.0, and 6.4. Initially disclosed on November 18, 2025, this vulnerability was internally discovered by Gwendal Guégniaud of Fortinet Product Security Team (Fortinet Advisory, NVD).

Technische Details

The vulnerability is classified as a stack-based buffer overflow (CWE-124) in the CAPWAP daemon. It allows a remote authenticated attacker to execute arbitrary code or commands as a low privileged user through specially crafted packets. The vulnerability has been assigned a CVSSv3.1 score of 6.9 (Medium severity). Successful exploitation requires significant preparation due to stack protection and ASLR (Address Space Layout Randomization) security measures. Additionally, the attacker must be able to pose as an authorized FortiAP or FortiExtender (Fortinet Advisory).

Aufprall

If successfully exploited, the vulnerability allows attackers to execute unauthorized code or commands with low-level privileges. The impact is particularly concerning in environments where FortiAP or FortiExtender devices are deployed. When auto-auth-extension-device is enabled in the system interface configuration, the vulnerability can be exploited without administrator authorization, though this feature is disabled by default (Fortinet Advisory, CIS Advisory).

Risikominderung und Problemumgehungen

Fortinet has released patches and recommends upgrading to FortiOS version 7.6.4 or above for 7.6.x installations, and 7.4.9 or above for 7.4.x installations. Users of FortiOS 7.2, 7.0, and 6.4 versions should migrate to a fixed release. Temporary workarounds include disabling security fabric access into interface and only allowing legitimate devices in Wifi Controller > Managed FortiAPs. It's crucial to ensure that auto-auth-extension-device is disabled in the system interface configuration (Fortinet Advisory).

Zusätzliche Ressourcen


QuelleDieser Bericht wurde mithilfe von KI erstellt

Verwandt FortiOS Schwachstellen:

CVE-Kennung

Strenge

Punktzahl

Technologieen

Name der Komponente

CISA KEV-Exploit

Hat fix

Veröffentlichungsdatum

CVE-2025-58413HIGH7.5
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NeinJaNov 18, 2025
CVE-2025-53843HIGH7.5
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NeinJaNov 18, 2025
CVE-2025-58325MEDIUM6.7
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NeinJaOct 14, 2025
CVE-2025-54821MEDIUM6
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NeinJaNov 18, 2025
CVE-2025-58903MEDIUM4.9
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NeinJaOct 14, 2025

Kostenlose Schwachstellenbewertung

Benchmarking Ihrer Cloud-Sicherheitslage

Bewerten Sie Ihre Cloud-Sicherheitspraktiken in 9 Sicherheitsbereichen, um Ihr Risikoniveau zu bewerten und Lücken in Ihren Abwehrmaßnahmen zu identifizieren.

Bewertung anfordern

Eine personalisierte Demo anfordern

Sind Sie bereit, Wiz in Aktion zu sehen?

"Die beste Benutzererfahrung, die ich je gesehen habe, bietet vollständige Transparenz für Cloud-Workloads."
David EstlickCISO
"„Wiz bietet eine zentrale Oberfläche, um zu sehen, was in unseren Cloud-Umgebungen vor sich geht.“ "
Adam FletcherSicherheitsbeauftragter
"„Wir wissen, dass, wenn Wiz etwas als kritisch identifiziert, es auch tatsächlich ist.“"
Greg PoniatowskiLeiter Bedrohungs- und Schwachstellenmanagement