Cybersecurity Forecast 2026: What to Expect – New Report

CVE-2025-64446

Critical Path Traversal in FortiWeb Allowing Remote Admin Access: CVE-2025-64446 Explained

Vulnerability Overview

CVE ID: CVE-2025-64446

CVE Title: Path Traversal in FortiWeb Allowing Remote Administrative Access

Severity: Critical

Exploit Status: Confirmed active exploitation; public PoC reported

Business Risk: Attackers can gain admin access to FortiWeb, risking device compromise.

Summary

A FortiWeb path traversal vulnerability known as CVE-2025-64446 allows unauthenticated attackers to execute admin commands through specially constructed HTTP/HTTPS requests. Attacks are ongoing, and there are public PoCs. The most recent releases include fixes for affected versions 7.0.0–8.0.1. Until a patch is applied, Fortinet recommends turning off internet-facing HTTP and HTTPS and keeping an eye on logs.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-64446?

Technical Overview

How Does the CVE-2025-64446 Exploit Work?

The attack typically follows these steps:

CVE‑2025‑64446 Exploitation Process

What Causes CVE-2025-64446?

Vulnerability Root Cause:

This weakness arises from insufficient path handling in FortiWeb’s processing of HTTP and HTTPS requests. The system does not properly normalize usercontrolled paths, allowing traversal sequences to bypass expected directory restrictions. Because of this, crafted requests can reach internal administrative endpoints and trigger highprivilege actions without authentication.

How Can You Mitigate CVE-2025-64446?

If immediate patching is delayed or not possible:

  • Disable public HTTP/HTTPS administrative access.
  • Restrict management interfaces so they are reachable only from trusted internal networks.
  • Apply firewall rules to limit access to admin ports.
  • Monitor logs for traversal-like patterns or unexpected administrative command activity.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Remediation & Response

Remediation Timeline:

Rollback Plan:

Incident Response Considerations:

CVSS Breakdown Table

MetricValue Description
Base Score9.8Critical severity indicating high impact and exploitability
Attack VectorNetworkExploitable remotely over HTTP/HTTPS without local access
Attack ComplexityLowStraightforward exploitation; no special conditions required
Privileges RequiredNoneNo authentication or elevated privileges needed
User Interaction NoneNo user action required for exploitation
Scope UnChanged Exploitation impacts only the vulnerable FortiWeb component
Confidentiality Impact HighSuccessful exploit can expose sensitive configuration and data
Integrity ImpactHighExploit can allow unauthorized modification of configuration or commands
Availability ImpactHighExploit may allow administrative actions affecting system availability

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.