CVE-2025-53843
FortiOS Analyse et atténuation des vulnérabilités

Aperçu

CVE-2025-53843 is a stack-based buffer overflow vulnerability discovered in the CAPWAP daemon of Fortinet FortiOS. The vulnerability affects multiple versions including FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, and all versions of FortiOS 7.2, 7.0, and 6.4. Initially disclosed on November 18, 2025, this vulnerability was internally discovered by Gwendal Guégniaud of Fortinet Product Security Team (Fortinet Advisory, NVD).

Détails techniques

The vulnerability is classified as a stack-based buffer overflow (CWE-124) in the CAPWAP daemon. It allows a remote authenticated attacker to execute arbitrary code or commands as a low privileged user through specially crafted packets. The vulnerability has been assigned a CVSSv3.1 score of 6.9 (Medium severity). Successful exploitation requires significant preparation due to stack protection and ASLR (Address Space Layout Randomization) security measures. Additionally, the attacker must be able to pose as an authorized FortiAP or FortiExtender (Fortinet Advisory).

Impact

If successfully exploited, the vulnerability allows attackers to execute unauthorized code or commands with low-level privileges. The impact is particularly concerning in environments where FortiAP or FortiExtender devices are deployed. When auto-auth-extension-device is enabled in the system interface configuration, the vulnerability can be exploited without administrator authorization, though this feature is disabled by default (Fortinet Advisory, CIS Advisory).

Atténuation et solutions de contournement

Fortinet has released patches and recommends upgrading to FortiOS version 7.6.4 or above for 7.6.x installations, and 7.4.9 or above for 7.4.x installations. Users of FortiOS 7.2, 7.0, and 6.4 versions should migrate to a fixed release. Temporary workarounds include disabling security fabric access into interface and only allowing legitimate devices in Wifi Controller > Managed FortiAPs. It's crucial to ensure that auto-auth-extension-device is disabled in the system interface configuration (Fortinet Advisory).

Ressources additionnelles


SourceCe rapport a été généré à l’aide de l’IA

Apparenté FortiOS Vulnérabilités:

Identifiant CVE

Sévérité

Score

Technologies

Nom du composant

Exploit CISA KEV

A corrigé

Date de publication

CVE-2025-58413HIGH7.5
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NonOuiNov 18, 2025
CVE-2025-53843HIGH7.5
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NonOuiNov 18, 2025
CVE-2025-58325MEDIUM6.7
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NonOuiOct 14, 2025
CVE-2025-54821MEDIUM6
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NonOuiNov 18, 2025
CVE-2025-58903MEDIUM4.9
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NonOuiOct 14, 2025

Évaluation gratuite des vulnérabilités

Évaluez votre posture de sécurité dans le cloud

Évaluez vos pratiques de sécurité cloud dans 9 domaines de sécurité pour évaluer votre niveau de risque et identifier les failles dans vos défenses.

Demander une évaluation

Obtenez une démo personnalisée

Prêt(e) à voir Wiz en action ?

"La meilleure expérience utilisateur que j’ai jamais vue, offre une visibilité totale sur les workloads cloud."
David EstlickRSSI
"Wiz fournit une interface unique pour voir ce qui se passe dans nos environnements cloud."
Adam FletcherChef du service de sécurité
"Nous savons que si Wiz identifie quelque chose comme critique, c’est qu’il l’est réellement."
Greg PoniatowskiResponsable de la gestion des menaces et des vulnérabilités