CVE-2025-22252
FortiOS vulnerability analysis and mitigation

Overview

A critical authentication bypass vulnerability (CVE-2025-22252) was discovered in Fortinet products, specifically affecting FortiOS versions 7.4.4 through 7.4.6 and 7.6.0, FortiProxy versions 7.6.0 through 7.6.1, and FortiSwitchManager version 7.2.5. The vulnerability was initially disclosed on May 13, 2025, and involves a missing authentication mechanism for critical functions in TACACS+ configurations using ASCII authentication. This security flaw could potentially allow an attacker with knowledge of an existing admin account to bypass authentication and access the device with administrative privileges (Fortinet Advisory, NVD).

Technical details

The vulnerability is classified as a 'Missing Authentication for Critical Function' (CWE-306) that specifically affects TACACS+ configurations when using ASCII authentication with remote TACACS+ servers. The severity of this vulnerability is rated as Critical with a CVSSv3 score of 9.0 according to Fortinet, while the NVD assessment rates it at 7.2 (HIGH). This discrepancy in scoring reflects different interpretations of the attack complexity and required privileges. The vulnerability is specifically limited to configurations where ASCII authentication is used, while PAP, MSCHAP, and CHAP authentication methods are not affected (Fortinet Advisory).

Impact

The successful exploitation of this vulnerability could lead to a significant security breach, allowing attackers to gain unauthorized administrative access to affected devices. This could result in complete system compromise and privilege escalation, potentially enabling attackers to take full control of the affected systems (Fortinet Advisory).

Mitigation and workarounds

Fortinet has released patches to address this vulnerability and recommends upgrading to the following versions: FortiOS 7.6.1 or above for 7.6 branch, FortiOS 7.4.7 or above for 7.4 branch, FortiProxy 7.6.2 or above, and FortiSwitchManager 7.2.6 or above. As a temporary workaround, administrators can use alternate authentication methods such as PAP, MSCHAP, or CHAP, or unset the authentication type in the TACACS+ configuration. By default, when 'authen-type' is set to 'auto', ASCII authentication is not used and therefore not vulnerable (Fortinet Advisory).

Community reactions

The vulnerability was responsibly disclosed by security researchers Cam B from Vital and Matheus Maia from NBS Telecom. Fortinet has acknowledged their contribution in identifying and reporting this security issue (Fortinet Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management