Refine your search

6 vulnerabilities found for fortiextender_firmware by fortinet

CVE-2025-64153 (GCVE-0-2025-64153)
Vulnerability from nvd
Published
2025-12-09 17:18
Modified
2025-12-09 20:43
CWE
  • CWE-78 - Execute unauthorized code or commands
Summary
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiExtender 7.6.0 through 7.6.3, FortiExtender 7.4.0 through 7.4.7, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated attacker to execute unauthorized code or commands via a specific HTTP request.
Impacted products
Vendor Product Version
Fortinet FortiExtender Version: 7.6.0    7.6.3
Version: 7.4.0    7.4.7
Version: 7.2.0    7.2.5
Version: 7.0.0    7.0.5
    cpe:2.3:a:fortinet:fortiextender:7.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.0:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-64153",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-09T20:21:16.823596Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-09T20:43:33.205Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:fortinet:fortiextender:7.6.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.6.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.6.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.6.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "FortiExtender",
          "vendor": "Fortinet",
          "versions": [
            {
              "lessThanOrEqual": "7.6.3",
              "status": "affected",
              "version": "7.6.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.4.7",
              "status": "affected",
              "version": "7.4.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.2.5",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.0.5",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A improper neutralization of special elements used in an os command (\u0027os command injection\u0027) in Fortinet FortiExtender 7.6.0 through 7.6.3, FortiExtender 7.4.0 through 7.4.7, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated attacker to execute unauthorized code or commands via a specific HTTP request."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "Execute unauthorized code or commands",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-09T17:18:45.909Z",
        "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
        "shortName": "fortinet"
      },
      "references": [
        {
          "name": "https://fortiguard.fortinet.com/psirt/FG-IR-25-739",
          "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-739"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to FortiExtender version 7.6.4 or above\nUpgrade to FortiExtender version 7.4.8 or above"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
    "assignerShortName": "fortinet",
    "cveId": "CVE-2025-64153",
    "datePublished": "2025-12-09T17:18:45.909Z",
    "dateReserved": "2025-10-28T12:26:50.749Z",
    "dateUpdated": "2025-12-09T20:43:33.205Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-46776 (GCVE-0-2025-46776)
Vulnerability from nvd
Published
2025-11-18 17:01
Modified
2025-11-18 18:34
CWE
  • CWE-120 - Escalation of privilege
Summary
A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiExtender 7.6.0 through 7.6.1, FortiExtender 7.4.0 through 7.4.6, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated user to execute arbitrary code or commands via crafted CLI commands.
Impacted products
Vendor Product Version
Fortinet FortiExtender Version: 7.6.0    7.6.1
Version: 7.4.0    7.4.6
Version: 7.2.0    7.2.5
Version: 7.0.0    7.0.5
    cpe:2.3:a:fortinet:fortiextender:7.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.0:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-46776",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-18T18:33:55.201822Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-18T18:34:05.679Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:fortinet:fortiextender:7.6.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.6.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "FortiExtender",
          "vendor": "Fortinet",
          "versions": [
            {
              "lessThanOrEqual": "7.6.1",
              "status": "affected",
              "version": "7.6.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.4.6",
              "status": "affected",
              "version": "7.4.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.2.5",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.0.5",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A buffer copy without checking size of input (\u0027classic buffer overflow\u0027) in Fortinet FortiExtender 7.6.0 through 7.6.1, FortiExtender 7.4.0 through 7.4.6, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated user to execute arbitrary code or commands via crafted CLI commands."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-120",
              "description": "Escalation of privilege",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-18T17:01:17.437Z",
        "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
        "shortName": "fortinet"
      },
      "references": [
        {
          "name": "https://fortiguard.fortinet.com/psirt/FG-IR-25-251",
          "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-251"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to FortiExtender version 7.6.3 or above\nUpgrade to upcoming  FortiExtender version 7.4.8 or above"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
    "assignerShortName": "fortinet",
    "cveId": "CVE-2025-46776",
    "datePublished": "2025-11-18T17:01:17.437Z",
    "dateReserved": "2025-04-29T08:42:13.449Z",
    "dateUpdated": "2025-11-18T18:34:05.679Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-46775 (GCVE-0-2025-46775)
Vulnerability from nvd
Published
2025-11-18 17:01
Modified
2025-11-18 18:33
CWE
Summary
A debug messages revealing unnecessary information vulnerability in Fortinet FortiExtender 7.6.0 through 7.6.1, FortiExtender 7.4.0 through 7.4.6, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated user to obtain administrator credentials via debug log commands.
Impacted products
Vendor Product Version
Fortinet FortiExtender Version: 7.6.0    7.6.1
Version: 7.4.0    7.4.6
Version: 7.2.0    7.2.5
Version: 7.0.0    7.0.5
    cpe:2.3:a:fortinet:fortiextender:7.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.0:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-46775",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-18T18:33:30.741688Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-18T18:33:37.068Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:fortinet:fortiextender:7.6.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.6.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "FortiExtender",
          "vendor": "Fortinet",
          "versions": [
            {
              "lessThanOrEqual": "7.6.1",
              "status": "affected",
              "version": "7.6.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.4.6",
              "status": "affected",
              "version": "7.4.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.2.5",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.0.5",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A debug messages revealing unnecessary information vulnerability in Fortinet FortiExtender 7.6.0 through 7.6.1, FortiExtender 7.4.0 through 7.4.6, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated user to obtain administrator credentials via debug log commands."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1295",
              "description": "Information disclosure",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-18T17:01:17.364Z",
        "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
        "shortName": "fortinet"
      },
      "references": [
        {
          "name": "https://fortiguard.fortinet.com/psirt/FG-IR-25-259",
          "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-259"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to FortiExtender version 7.6.3 or above\nUpgrade to upcoming  FortiExtender version 7.4.8 or above"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
    "assignerShortName": "fortinet",
    "cveId": "CVE-2025-46775",
    "datePublished": "2025-11-18T17:01:17.364Z",
    "dateReserved": "2025-04-29T08:42:13.449Z",
    "dateUpdated": "2025-11-18T18:33:37.068Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-64153 (GCVE-0-2025-64153)
Vulnerability from cvelistv5
Published
2025-12-09 17:18
Modified
2025-12-09 20:43
CWE
  • CWE-78 - Execute unauthorized code or commands
Summary
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiExtender 7.6.0 through 7.6.3, FortiExtender 7.4.0 through 7.4.7, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated attacker to execute unauthorized code or commands via a specific HTTP request.
Impacted products
Vendor Product Version
Fortinet FortiExtender Version: 7.6.0    7.6.3
Version: 7.4.0    7.4.7
Version: 7.2.0    7.2.5
Version: 7.0.0    7.0.5
    cpe:2.3:a:fortinet:fortiextender:7.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.0:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-64153",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-09T20:21:16.823596Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-09T20:43:33.205Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:fortinet:fortiextender:7.6.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.6.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.6.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.6.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.7:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "FortiExtender",
          "vendor": "Fortinet",
          "versions": [
            {
              "lessThanOrEqual": "7.6.3",
              "status": "affected",
              "version": "7.6.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.4.7",
              "status": "affected",
              "version": "7.4.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.2.5",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.0.5",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A improper neutralization of special elements used in an os command (\u0027os command injection\u0027) in Fortinet FortiExtender 7.6.0 through 7.6.3, FortiExtender 7.4.0 through 7.4.7, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated attacker to execute unauthorized code or commands via a specific HTTP request."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "Execute unauthorized code or commands",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-09T17:18:45.909Z",
        "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
        "shortName": "fortinet"
      },
      "references": [
        {
          "name": "https://fortiguard.fortinet.com/psirt/FG-IR-25-739",
          "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-739"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to FortiExtender version 7.6.4 or above\nUpgrade to FortiExtender version 7.4.8 or above"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
    "assignerShortName": "fortinet",
    "cveId": "CVE-2025-64153",
    "datePublished": "2025-12-09T17:18:45.909Z",
    "dateReserved": "2025-10-28T12:26:50.749Z",
    "dateUpdated": "2025-12-09T20:43:33.205Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-46776 (GCVE-0-2025-46776)
Vulnerability from cvelistv5
Published
2025-11-18 17:01
Modified
2025-11-18 18:34
CWE
  • CWE-120 - Escalation of privilege
Summary
A buffer copy without checking size of input ('classic buffer overflow') in Fortinet FortiExtender 7.6.0 through 7.6.1, FortiExtender 7.4.0 through 7.4.6, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated user to execute arbitrary code or commands via crafted CLI commands.
Impacted products
Vendor Product Version
Fortinet FortiExtender Version: 7.6.0    7.6.1
Version: 7.4.0    7.4.6
Version: 7.2.0    7.2.5
Version: 7.0.0    7.0.5
    cpe:2.3:a:fortinet:fortiextender:7.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.0:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-46776",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-18T18:33:55.201822Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-18T18:34:05.679Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:fortinet:fortiextender:7.6.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.6.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "FortiExtender",
          "vendor": "Fortinet",
          "versions": [
            {
              "lessThanOrEqual": "7.6.1",
              "status": "affected",
              "version": "7.6.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.4.6",
              "status": "affected",
              "version": "7.4.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.2.5",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.0.5",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A buffer copy without checking size of input (\u0027classic buffer overflow\u0027) in Fortinet FortiExtender 7.6.0 through 7.6.1, FortiExtender 7.4.0 through 7.4.6, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated user to execute arbitrary code or commands via crafted CLI commands."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-120",
              "description": "Escalation of privilege",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-18T17:01:17.437Z",
        "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
        "shortName": "fortinet"
      },
      "references": [
        {
          "name": "https://fortiguard.fortinet.com/psirt/FG-IR-25-251",
          "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-251"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to FortiExtender version 7.6.3 or above\nUpgrade to upcoming  FortiExtender version 7.4.8 or above"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
    "assignerShortName": "fortinet",
    "cveId": "CVE-2025-46776",
    "datePublished": "2025-11-18T17:01:17.437Z",
    "dateReserved": "2025-04-29T08:42:13.449Z",
    "dateUpdated": "2025-11-18T18:34:05.679Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-46775 (GCVE-0-2025-46775)
Vulnerability from cvelistv5
Published
2025-11-18 17:01
Modified
2025-11-18 18:33
CWE
Summary
A debug messages revealing unnecessary information vulnerability in Fortinet FortiExtender 7.6.0 through 7.6.1, FortiExtender 7.4.0 through 7.4.6, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated user to obtain administrator credentials via debug log commands.
Impacted products
Vendor Product Version
Fortinet FortiExtender Version: 7.6.0    7.6.1
Version: 7.4.0    7.4.6
Version: 7.2.0    7.2.5
Version: 7.0.0    7.0.5
    cpe:2.3:a:fortinet:fortiextender:7.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortiextender:7.0.0:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-46775",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-18T18:33:30.741688Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-18T18:33:37.068Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:fortinet:fortiextender:7.6.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.6.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.4.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.2.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortiextender:7.0.0:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "FortiExtender",
          "vendor": "Fortinet",
          "versions": [
            {
              "lessThanOrEqual": "7.6.1",
              "status": "affected",
              "version": "7.6.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.4.6",
              "status": "affected",
              "version": "7.4.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.2.5",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.0.5",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A debug messages revealing unnecessary information vulnerability in Fortinet FortiExtender 7.6.0 through 7.6.1, FortiExtender 7.4.0 through 7.4.6, FortiExtender 7.2 all versions, FortiExtender 7.0 all versions may allow an authenticated user to obtain administrator credentials via debug log commands."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:U/RC:C",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1295",
              "description": "Information disclosure",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-18T17:01:17.364Z",
        "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
        "shortName": "fortinet"
      },
      "references": [
        {
          "name": "https://fortiguard.fortinet.com/psirt/FG-IR-25-259",
          "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-259"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to FortiExtender version 7.6.3 or above\nUpgrade to upcoming  FortiExtender version 7.4.8 or above"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
    "assignerShortName": "fortinet",
    "cveId": "CVE-2025-46775",
    "datePublished": "2025-11-18T17:01:17.364Z",
    "dateReserved": "2025-04-29T08:42:13.449Z",
    "dateUpdated": "2025-11-18T18:33:37.068Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}