CVE-2025-58413
FortiOS Analyse et atténuation des vulnérabilités

Aperçu

A stack-based buffer overflow vulnerability (CVE-2025-58413) was discovered in the FortiOS CAPWAP daemon, affecting multiple versions of FortiOS (7.6.0 through 7.6.3, 7.4.0 through 7.4.8, and all versions of 7.2, 7.0, 6.4, 6.2, 6.0) and FortiSASE 25.3.b. The vulnerability was internally discovered by Gwendal Guégniaud of Fortinet Product Security team and was initially disclosed on November 18, 2025 (Fortinet Advisory, NVD).

Détails techniques

The vulnerability is classified as a stack-based buffer overflow (CWE-124) that exists in the CAPWAP daemon. It has been assigned a CVSSv3.1 base score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. The vulnerability requires the attacker to be on an adjacent network and have access to the same local IP subnet. Successful exploitation would require defeating stack protection and ASLR mechanisms (Fortinet Advisory).

Impact

If successfully exploited, this vulnerability allows a remote unauthenticated attacker to achieve arbitrary code execution by sending specially crafted packets. However, in the default configuration, the attacker must be in control of an authorized FortiAP for the attack to succeed (Fortinet Advisory).

Atténuation et solutions de contournement

Fortinet has released patches for affected versions and recommends upgrading to FortiOS 7.6.4 or above for 7.6.x versions, and 7.4.9 or above for 7.4.x versions. For other affected versions, users should migrate to a fixed release. Additionally, several workarounds are available: disabling security fabric access into interface, allowing only legitimate devices in Wifi Controller > Managed FortiAPs, and removing inter-controller-peer elements in wireless-controller inter-controller configuration. Users should ensure auto-auth-extension-device remains disabled (Fortinet Advisory).

Ressources additionnelles


SourceCe rapport a été généré à l’aide de l’IA

Apparenté FortiOS Vulnérabilités:

Identifiant CVE

Sévérité

Score

Technologies

Nom du composant

Exploit CISA KEV

A corrigé

Date de publication

CVE-2025-58413HIGH7.5
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NonOuiNov 18, 2025
CVE-2025-53843HIGH7.5
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NonOuiNov 18, 2025
CVE-2025-58325MEDIUM6.7
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NonOuiOct 14, 2025
CVE-2025-54821MEDIUM6
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NonOuiNov 18, 2025
CVE-2025-58903MEDIUM4.9
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NonOuiOct 14, 2025

Évaluation gratuite des vulnérabilités

Évaluez votre posture de sécurité dans le cloud

Évaluez vos pratiques de sécurité cloud dans 9 domaines de sécurité pour évaluer votre niveau de risque et identifier les failles dans vos défenses.

Demander une évaluation

Obtenez une démo personnalisée

Prêt(e) à voir Wiz en action ?

"La meilleure expérience utilisateur que j’ai jamais vue, offre une visibilité totale sur les workloads cloud."
David EstlickRSSI
"Wiz fournit une interface unique pour voir ce qui se passe dans nos environnements cloud."
Adam FletcherChef du service de sécurité
"Nous savons que si Wiz identifie quelque chose comme critique, c’est qu’il l’est réellement."
Greg PoniatowskiResponsable de la gestion des menaces et des vulnérabilités