CVE-2025-68648
A use of externally-controlled format string vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4.0 through 7.4.7, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer Cloud 7.6.0 through 7.6.4, FortiAnalyzer Cloud 7.4.0 through 7.4.7, FortiAnalyzer Cloud 7.2 all versions, FortiAnalyzer Cloud 7.0 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4.0 through 7.4.7, FortiManager 7.2 all versions, FortiManager 7.0 all versions, FortiManager Cloud 7.6.0 through 7.6.4, FortiManager Cloud 7.4.0 through 7.4.7, FortiManager Cloud 7.2 all versions, FortiManager Cloud 7.0 all versions may allow an attacker to escalate its privileges via specially crafted requests.
Attack Parameters
Technical Impact
Affected Configurations
Total: 149 detected entries
Time Line
Key Metrics
Recommended Solution
Related News Articles
2 article(s) mentioning this vulnerability
CISA ajoute quatre vulnérabilités actuellement exploitées au catalogue KEV
CISA met à jour son catalogue KEV avec quatre nouvelles vulnérabilités de sécurité actuellement exploitées.
CISA Adds Four Active Exploited Software Vulnerabilities to KEV Catalog
CISA updates its Known Exploited Vulnerabilities (KEV) catalog with four new security flaws that have been actively exploited.
Immediate Action Plan
1. Inventory
Identify all affected systems in your infrastructure.
2. Assessment
Assess exposure and criticality for your organization.
3. Mitigation
Apply patches or available workarounds.
4. Verification
Test and confirm effectiveness of applied measures.
