Code Defence Cyber security

CISA Orders Patching of Critical Fortinet FortiWeb Zero-Day (CVE-2025-64446)

CISA has added a critical Fortinet FortiWeb (WAF) vulnerability, CVE-2025-64446, to its Known Exploited Vulnerabilities (KEV) catalog, mandating a patch by November 21, 2025. The flaw is a path traversal vulnerability (CVSS 9.1) that allows unauthenticated, remote attackers to execute arbitrary administrative commands, including creating rogue admin accounts.

Business Impact

This is a “perimeter-down” emergency. The WAF is your first line of defense; if attackers control it, they can bypass all security, steal data, deface websites, and pivot into your internal network. Reports confirm attackers are already exploiting this to create new admin accounts for persistent access.

Why It Happened

The vulnerability allows attackers to send crafted HTTP requests to bypass security checks and perform administrative actions. The flaw was reportedly “silently patched” by Fortinet in late October, but without a public CVE, many organizations were left unaware and vulnerable.

Recommended Executive Action

This is an immediate, critical patching priority. Direct your network security team to apply the patches (v7.4.8 or 7.6.6) now. More importantly, they *must* audit all FortiWeb devices for any unauthorized administrator accounts created in the last 30 days, as you may already be compromised.

Hashtags: #Fortinet #FortiWeb #ZeroDay #Vulnerability #RCE #CISA #KEV #PatchNow #InfoSec

Scroll to Top

Review My Order

0

Subtotal