CVE-2025-58413
FortiOS vulnerability analysis and mitigation

Overview

A stack-based buffer overflow vulnerability (CVE-2025-58413) was discovered in the FortiOS CAPWAP daemon. The vulnerability was initially published on November 18, 2025, and affects multiple versions of FortiOS (6.0 through 7.6.3) and FortiSASE 25.3.b. This security issue has been assigned a medium severity rating with a CVSSv3 score of 6.9 (Fortinet PSIRT, NVD).

Technical details

The vulnerability is classified as a stack-based buffer overflow (CWE-124) in the CAPWAP daemon of FortiOS. The flaw allows a remote unauthenticated attacker on an adjacent network to potentially achieve arbitrary code execution by sending specially crafted packets. In the default configuration, successful exploitation requires the attacker to control an authorized FortiAP and have access to the same local IP subnet. Additionally, the attacker must bypass both stack protection and ASLR security mechanisms (Fortinet PSIRT).

Impact

If successfully exploited, this vulnerability allows attackers to execute unauthorized code or commands on affected systems. The attack requires specific conditions to be met, including network adjacency and control of an authorized FortiAP, which somewhat limits its potential impact (Fortinet PSIRT).

Mitigation and workarounds

Fortinet has released patches for affected versions. Users of FortiOS 7.6.0-7.6.3 should upgrade to version 7.6.4 or above, while FortiOS 7.4.0-7.4.8 users should upgrade to version 7.4.9 or above. Users of FortiOS versions 7.2, 7.0, 6.4, 6.2, and 6.0 should migrate to a fixed release. For FortiSASE 25.3.b, the issue has been remediated in version 25.3.c. Fortinet provides an upgrade path tool at their documentation site to assist with the upgrade process (Fortinet PSIRT).

Additional resources


SourceThis report was generated using AI

Related FortiOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-58413HIGH7.5
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NoYesNov 18, 2025
CVE-2025-53843HIGH7.5
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NoYesNov 18, 2025
CVE-2025-58325MEDIUM6.7
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NoYesOct 14, 2025
CVE-2025-58903MEDIUM4.9
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NoYesOct 14, 2025
CVE-2025-54821LOW1.9
  • FortiOSFortiOS
  • cpe:2.3:o:fortinet:fortios
NoYesNov 18, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management