Fortinet Fortios vulnerabilities
268 known vulnerabilities affecting fortinet/fortios.
Total CVEs
268
CISA KEV
18
actively exploited
Public exploits
19
Exploited in wild
13
Severity breakdown
CRITICAL25HIGH84MEDIUM149LOW10
Vulnerabilities
Page 3 of 14
CVE-2025-22254HIGHCVSS 7.2≥ 6.4.0, < 6.4.16≥ 7.0.0, < 7.0.17+8 more2025-06-10
CVE-2025-22254 [HIGH] CWE-269 CVE-2025-22254: An Improper Privilege Management vulnerability [CWE-269] vulnerability in Fortinet FortiOS 7.6.0 thr
An Improper Privilege Management vulnerability [CWE-269] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.1, FortiOS 7.4.0 through 7.4.6, FortiOS 7.2.0 through 7.2.10, FortiOS 7.0.0 through 7.0.16, FortiOS 6.4.0 through 6.4.15, FortiProxy 7.6.0 through 7.6.1, FortiProxy 7.4.0 through 7.4.7, FortiWeb 7.6.0 through 7.6.1, FortiWeb 7.4.0 through 7.4.6
cvelistv5nvd
CVE-2025-25250MEDIUMCVSS 4.3≥ 6.4.0, < 7.4.8v7.6.0+4 more2025-06-10
CVE-2025-25250 [MEDIUM] CWE-200 CVE-2025-25250: An Exposure of Sensitive Information to an Unauthorized Actor vulnerability [CWE-200] in FortiOS ver
An Exposure of Sensitive Information to an Unauthorized Actor vulnerability [CWE-200] in FortiOS version 7.6.0, version 7.4.7 and below, 7.2 all versions, 7.0 all versions, 6.4 all versions SSL-VPN web-mode may allow an authenticated user to access full SSL-VPN settings via crafted URL.
cvelistv5nvd
CVE-2025-22251MEDIUMCVSS 5.3≥ 6.4.0, < 7.4.6v7.6.0+4 more2025-06-10
CVE-2025-22251 [MEDIUM] CWE-923 CVE-2025-22251: An improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fo
An improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in FortiOS 7.6.0, 7.4.0 through 7.4.5, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an unauthenticated attacker to inject unauthorized sessions via crafted FGSP session synchronization packets.
cvelistv5nvd
CVE-2024-50568MEDIUMCVSS 5.9≥ 6.4.2, < 7.2.9≥ 7.4.0, < 7.4.4+4 more2025-06-10
CVE-2024-50568 [MEDIUM] CWE-300 CVE-2024-50568: A channel accessible by non-endpoint vulnerability [CWE-300] in Fortinet FortiOS version 7.4.0 throu
A channel accessible by non-endpoint vulnerability [CWE-300] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7 and before 7.0.14 & FortiProxy version 7.4.0 through 7.4.3, 7.2.0 through 7.2.9 and before 7.0.16 allows an unauthenticated attacker with the knowledge of device specific data to spoof the identity of a downstream device
cvelistv5nvd
CVE-2025-24471MEDIUMCVSS 6.5≥ 7.4.0, < 7.4.8≥ 7.6.0, < 7.6.2+2 more2025-06-10
CVE-2025-24471 [MEDIUM] CWE-295 CVE-2025-24471: An Improper Certificate Validation vulnerability [CWE-295] in FortiOS version 7.6.1 and below, versi
An Improper Certificate Validation vulnerability [CWE-295] in FortiOS version 7.6.1 and below, version 7.4.7 and below may allow an EAP verified remote user to connect from FortiClient via revoked certificate.
cvelistv5nvd
CVE-2024-50562MEDIUMCVSS 4.8PoC≥ 6.4.0, < 7.2.11≥ 7.4.0, < 7.4.8+6 more2025-06-10
CVE-2024-50562 [MEDIUM] CWE-613 CVE-2024-50562: An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL-VPN version 7.6.0, version
An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL-VPN version 7.6.0, version 7.4.6 and below, version 7.2.10 and below, 7.0 all versions, 6.4 all versions may allow an attacker in possession of a cookie used to log in the SSL-VPN portal to log in again, although the session has expired or was logged out.
cvelistv5nvd
CVE-2023-29184LOWCVSS 2.3≥ 6.2.0, ≤ 7.2.11≥ 7.2.0, ≤ 7.2.11+2 more2025-06-10
CVE-2023-29184 [LOW] CWE-459 CVE-2023-29184: An incomplete cleanup vulnerability [CWE-459] in FortiOS 7.2 all versions and before & FortiProxy v
An incomplete cleanup vulnerability [CWE-459] in FortiOS 7.2 all versions and before & FortiProxy version 7.2.0 through 7.2.2 and before 7.0.8 allows a VDOM privileged attacker to add SSH key files on the system silently via crafted CLI requests.
cvelistv5nvd
CVE-2025-22252HIGHCVSS 7.2≥ 7.4.4, < 7.4.7v7.6.0+1 more2025-05-28
CVE-2025-22252 [HIGH] CWE-306 CVE-2025-22252: A missing authentication for critical function in Fortinet FortiProxy versions 7.6.0 through 7.6.1,
A missing authentication for critical function in Fortinet FortiProxy versions 7.6.0 through 7.6.1, FortiSwitchManager version 7.2.5, and FortiOS versions 7.4.4 through 7.4.6 and version 7.6.0 may allow an attacker with knowledge of an existing admin account to access the device as a valid admin via an authentication bypass.
cvelistv5nvd
CVE-2025-47294MEDIUMCVSS 5.3≥ 6.4.0, < 7.0.15≥ 7.2.0, < 7.2.8+3 more2025-05-28
CVE-2025-47294 [MEDIUM] CWE-190 CVE-2025-47294: A integer overflow or wraparound in Fortinet FortiOS versions 7.2.0 through 7.2.7, versions 7.0.0 th
A integer overflow or wraparound in Fortinet FortiOS versions 7.2.0 through 7.2.7, versions 7.0.0 through 7.0.14 may allow a remote unauthenticated attacker to crash the csfd daemon via a specially crafted request.
cvelistv5nvd
CVE-2025-47295LOWCVSS 3.7≥ 6.4.0, < 7.0.15≥ 7.2.0, < 7.2.8+5 more2025-05-28
CVE-2025-47295 [LOW] CWE-126 CVE-2025-47295: A buffer over-read in Fortinet FortiOS versions 7.4.0 through 7.4.3, versions 7.2.0 through 7.2.7, a
A buffer over-read in Fortinet FortiOS versions 7.4.0 through 7.4.3, versions 7.2.0 through 7.2.7, and versions 7.0.0 through 7.0.14 may allow a remote unauthenticated attacker to crash the FGFM daemon via a specially crafted request, under rare conditions that are outside of the attacker's control.
cvelistv5nvd
CVE-2024-26013HIGHCVSS 7.5≥ 6.4.0, < 7.0.16≥ 7.2.0, < 7.2.9+6 more2025-04-08
CVE-2024-26013 [HIGH] CWE-923 CVE-2024-26013: A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in For
A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15 and before 6.2.16, Fortinet FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9 and before 7.0.15, Fortinet FortiManager version 7.4.0 thr
cvelistv5nvd
CVE-2023-37930HIGHCVSS 8.8≥ 6.4.7, < 6.4.15≥ 7.0.1, < 7.0.13+5 more2025-04-08
CVE-2023-37930 [HIGH] CWE-908 CVE-2023-37930: Multiple issues including the use of uninitialized ressources [CWE-908] and excessive iteration [CWE
Multiple issues including the use of uninitialized ressources [CWE-908] and excessive iteration [CWE-834] vulnerabilities vulnerability in Fortinet allows a VPN user to corrupt memory potentially leading to code or commands execution via specifically crafted requests.
cvelistv5nvd
CVE-2024-50565HIGHCVSS 7.5≥ 6.4.0, < 7.0.16≥ 7.2.0, < 7.2.9+6 more2025-04-08
CVE-2024-50565 [HIGH] CWE-300 CVE-2024-50565: A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in For
A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15 and 6.2.0 through 6.2.16, Fortinet FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.15 and 2.0.0 through 2.0.14, For
cvelistv5nvd
CVE-2024-32122MEDIUMCVSS 4.4≥ 6.4.0, ≤ 6.4.16≥ 7.0.0, ≤ 7.0.17+2 more2025-04-08
CVE-2024-32122 [MEDIUM] CWE-257 CVE-2024-32122: A storing passwords in a recoverable format in Fortinet FortiOS 7.4.0 through 7.4.8, FortiOS 7.2 all
A storing passwords in a recoverable format in Fortinet FortiOS 7.4.0 through 7.4.8, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions allows attacker to information disclosure via modification of LDAP server IP to point to a malicious server.
cvelistv5nvd
CVE-2023-25610CRITICALCVSS 9.8≥ 5.0.0, < 6.2.13≥ 6.4.0, < 6.4.12+11 more2025-03-24
CVE-2023-25610 [CRITICAL] CWE-124 CVE-2023-25610: A buffer underwrite ('buffer underflow') vulnerability in the administrative interface of Fortinet F
A buffer underwrite ('buffer underflow') vulnerability in the administrative interface of Fortinet FortiOS version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.6, version 6.4.0 through 6.4.11 and version 6.2.12 and below, FortiProxy version 7.2.0 through 7.2.2, version 7.0.0 through 7.0.8, version 2.0.12 and below and FortiOS-6K7K version 7.0.5,
cvelistv5nvd
CVE-2019-16151MEDIUMCVSS 6.1≥ 6.2.0, < 6.2.10≥ 6.4.0, < 6.4.2+2 more2025-03-21
CVE-2019-16151 [MEDIUM] CWE-79 CVE-2019-16151: An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiOS 6.4
An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiOS 6.4.1 and below, 6.2.9 and below may allow a remote unauthenticated attacker to either redirect users to malicious websites via a crafted "Host" header or to execute JavaScript code in the victim's browser context.
This happens when the FortiGate has web
cvelistv5nvd
CVE-2019-15706MEDIUMCVSS 5.4≥ 5.6.0, < 5.6.13≥ 6.0.0, < 6.0.9+4 more2025-03-17
CVE-2019-15706 [MEDIUM] CWE-79 CVE-2019-15706: An improper neutralization of input during web page generation in the SSL VPN portal of FortiProxy v
An improper neutralization of input during web page generation in the SSL VPN portal of FortiProxy version 2.0.0, version 1.2.9 and below and FortiOS version 6.2.1 and below, version 6.0.8 and below, version 5.6.12 may allow a remote authenticated attacker to perform a stored cross site scripting attack (XSS).
cvelistv5nvd
CVE-2020-29010MEDIUMCVSS 5.0≥ 6.0.0, < 6.0.11≥ 6.2.0, < 6.2.5+2 more2025-03-17
CVE-2020-29010 [MEDIUM] CWE-200 CVE-2020-29010: An exposure of sensitive information to an unauthorized actor vulnerability in FortiOS version 6.2.4
An exposure of sensitive information to an unauthorized actor vulnerability in FortiOS version 6.2.4 and below, version 6.0.10 and belowmay allow remote authenticated actors to read the SSL VPN events log entries of users in other VDOMs by executing "get vpn ssl monitor" from the CLI. The sensitive data includes usernames, user groups, and IP addres
cvelistv5nvd
CVE-2019-6697MEDIUMCVSS 6.1≥ 6.0.0, < 6.0.7≥ 6.2.0, < 6.2.2+1 more2025-03-17
CVE-2019-6697 [MEDIUM] CWE-79 CVE-2019-6697: An Improper Neutralization of Input vulnerability affecting FortiGate version 6.2.0 through 6.2.1, 6
An Improper Neutralization of Input vulnerability affecting FortiGate version 6.2.0 through 6.2.1, 6.0.0 through 6.0.6 in the hostname parameter of a DHCP packet under DHCP monitor page may allow an unauthenticated attacker in the same network as the FortiGate to perform a Stored Cross Site Scripting attack (XSS) by sending a crafted DHCP packet.
cvelistv5nvd
CVE-2024-26006MEDIUMCVSS 6.1≥ 6.4.0, < 7.0.14≥ 7.2.0, < 7.2.8+5 more2025-03-14
CVE-2024-26006 [MEDIUM] CWE-79 CVE-2024-26006: An improper neutralization of input during web page Generation vulnerability [CWE-79] in FortiOS ver
An improper neutralization of input during web page Generation vulnerability [CWE-79] in FortiOS version 7.4.3 and below, version 7.2.7 and below, version 7.0.13 and below and FortiProxy version 7.4.3 and below, version 7.2.9 and below, version 7.0.16 and below web SSL VPN UI may allow a remote unauthenticated attacker to perform a Cross-Site Scripti
cvelistv5nvd