CVE-2025-58413
FortiOS Análisis y mitigación de vulnerabilidades

Vista general

A stack-based buffer overflow vulnerability (CVE-2025-58413) was discovered in the FortiOS CAPWAP daemon. The vulnerability was initially published on November 18, 2025, and affects multiple versions of FortiOS (6.0 through 7.6.3) and FortiSASE 25.3.b. This security issue has been assigned a medium severity rating with a CVSSv3 score of 6.9 (Fortinet PSIRT, NVD).

Técnicas

The vulnerability is classified as a stack-based buffer overflow (CWE-124) in the CAPWAP daemon of FortiOS. The flaw allows a remote unauthenticated attacker on an adjacent network to potentially achieve arbitrary code execution by sending specially crafted packets. In the default configuration, successful exploitation requires the attacker to control an authorized FortiAP and have access to the same local IP subnet. Additionally, the attacker must bypass both stack protection and ASLR security mechanisms (Fortinet PSIRT).

Impacto

If successfully exploited, this vulnerability allows attackers to execute unauthorized code or commands on affected systems. The attack requires specific conditions to be met, including network adjacency and control of an authorized FortiAP, which somewhat limits its potential impact (Fortinet PSIRT).

Mitigación y soluciones alternativas

Fortinet has released patches for affected versions. Users of FortiOS 7.6.0-7.6.3 should upgrade to version 7.6.4 or above, while FortiOS 7.4.0-7.4.8 users should upgrade to version 7.4.9 or above. Users of FortiOS versions 7.2, 7.0, 6.4, 6.2, and 6.0 should migrate to a fixed release. For FortiSASE 25.3.b, the issue has been remediated in version 25.3.c. Fortinet provides an upgrade path tool at their documentation site to assist with the upgrade process (Fortinet PSIRT).

Recursos adicionales


FuenteEste informe se generó utilizando IA

Relacionado FortiOS Vulnerabilidades:

CVE ID

Severidad

Puntuación

Tecnologías

Nombre del componente

Exploit de CISA KEV

Tiene arreglo

Fecha de publicación

CVE-2025-58413HIGH7.5
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NoNov 18, 2025
CVE-2025-53843HIGH7.5
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NoNov 18, 2025
CVE-2025-58325MEDIUM6.7
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NoOct 14, 2025
CVE-2025-58903MEDIUM4.9
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NoOct 14, 2025
CVE-2025-54821LOW1.9
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NoNov 18, 2025

Evaluación gratuita de vulnerabilidades

Compare su postura de seguridad en la nube

Evalúe sus prácticas de seguridad en la nube en 9 dominios de seguridad para comparar su nivel de riesgo e identificar brechas en sus defensas.

Solicitar evaluación

Recursos adicionales de Wiz

Obtén una demostración personalizada

¿Listo para ver a Wiz en acción?

"La mejor experiencia de usuario que he visto en mi vida, proporciona una visibilidad completa de las cargas de trabajo en la nube."
David EstlickCISO
"Wiz proporciona un panel único para ver lo que ocurre en nuestros entornos en la nube."
Adam FletcherJefe de Seguridad
"Sabemos que si Wiz identifica algo como crítico, en realidad lo es."
Greg PoniatowskiJefe de Gestión de Amenazas y Vulnerabilidades