Search criteria

10 vulnerabilities found for FortiDLP by Fortinet

CVE-2025-46752 (GCVE-0-2025-46752)

Vulnerability from cvelistv5 – Published: 2025-10-16 14:00 – Updated: 2025-10-16 14:20
VLAI?
Summary
A insertion of sensitive information into log file in Fortinet FortiDLP 12.0.0 through 12.0.5, 11.5.1, 11.4.6, 11.4.5 allows attacker to information disclosure via re-using the enrollment code.
CWE
Assigner
Impacted products
Vendor Product Version
Fortinet FortiDLP Affected: 12.0.4 , ≤ 12.0.5 (semver)
Affected: 12.0.2
Affected: 12.0.0
Affected: 11.5.1
Affected: 11.4.5 , ≤ 11.4.6 (semver)
    cpe:2.3:a:fortinet:fortidlp:12.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:12.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:12.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:12.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.5:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-46752",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-16T14:20:20.963552Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-16T14:20:31.156Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:fortinet:fortidlp:12.0.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:12.0.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:12.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:12.0.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.5.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.5:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "FortiDLP",
          "vendor": "Fortinet",
          "versions": [
            {
              "lessThanOrEqual": "12.0.5",
              "status": "affected",
              "version": "12.0.4",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "12.0.2"
            },
            {
              "status": "affected",
              "version": "12.0.0"
            },
            {
              "status": "affected",
              "version": "11.5.1"
            },
            {
              "lessThanOrEqual": "11.4.6",
              "status": "affected",
              "version": "11.4.5",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A insertion of sensitive information into log file in Fortinet FortiDLP 12.0.0 through 12.0.5, 11.5.1, 11.4.6, 11.4.5 allows attacker to information disclosure via re-using the enrollment code."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:P/RL:U/RC:C",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-532",
              "description": "Information disclosure",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-16T14:00:30.930Z",
        "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
        "shortName": "fortinet"
      },
      "references": [
        {
          "name": "https://fortiguard.fortinet.com/psirt/FG-IR-25-160",
          "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-160"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to FortiDLP version 12.1.0 or above"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
    "assignerShortName": "fortinet",
    "cveId": "CVE-2025-46752",
    "datePublished": "2025-10-16T14:00:30.930Z",
    "dateReserved": "2025-04-29T00:20:46.508Z",
    "dateUpdated": "2025-10-16T14:20:31.156Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-53950 (GCVE-0-2025-53950)

Vulnerability from cvelistv5 – Published: 2025-10-16 14:00 – Updated: 2025-10-16 14:22
VLAI?
Summary
An Exposure of Private Personal Information ('Privacy Violation') vulnerability [CWE-359] in Fortinet FortiDLP Agent's Outlookproxy plugin for MacOS and Windows 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1. through 11.1.2 and 11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated administrator to collect current user's email information.
CWE
Assigner
Impacted products
Vendor Product Version
Fortinet FortiDLP Affected: 11.5.1
Affected: 11.4.2 , ≤ 11.4.6 (semver)
Affected: 11.3.2 , ≤ 11.3.4 (semver)
Affected: 11.2.3
Affected: 11.2.0
Affected: 11.1.1 , ≤ 11.1.2 (semver)
Affected: 11.0.1
Affected: 10.5.1
Affected: 10.4.0
Affected: 10.3.1
    cpe:2.3:a:fortinet:fortidlp:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.3.1:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-53950",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-16T14:22:49.612036Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-16T14:22:55.551Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:fortinet:fortidlp:11.5.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.2.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.2.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.1.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.1.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.5.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.4.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.3.1:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "FortiDLP",
          "vendor": "Fortinet",
          "versions": [
            {
              "status": "affected",
              "version": "11.5.1"
            },
            {
              "lessThanOrEqual": "11.4.6",
              "status": "affected",
              "version": "11.4.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "11.3.4",
              "status": "affected",
              "version": "11.3.2",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "11.2.3"
            },
            {
              "status": "affected",
              "version": "11.2.0"
            },
            {
              "lessThanOrEqual": "11.1.2",
              "status": "affected",
              "version": "11.1.1",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "11.0.1"
            },
            {
              "status": "affected",
              "version": "10.5.1"
            },
            {
              "status": "affected",
              "version": "10.4.0"
            },
            {
              "status": "affected",
              "version": "10.3.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An Exposure of Private Personal Information (\u0027Privacy Violation\u0027) vulnerability [CWE-359] in Fortinet FortiDLP Agent\u0027s Outlookproxy plugin for MacOS and Windows 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1. through 11.1.2 and 11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated administrator to collect current user\u0027s email information."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N/E:F/RL:O/RC:C",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-359",
              "description": "Information disclosure",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-16T14:00:05.329Z",
        "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
        "shortName": "fortinet"
      },
      "references": [
        {
          "name": "https://fortiguard.fortinet.com/psirt/FG-IR-25-639",
          "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-639"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to FortiDLP version 12.0.0 or above"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
    "assignerShortName": "fortinet",
    "cveId": "CVE-2025-53950",
    "datePublished": "2025-10-16T14:00:05.329Z",
    "dateReserved": "2025-07-15T09:52:08.702Z",
    "dateUpdated": "2025-10-16T14:22:55.551Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-53951 (GCVE-0-2025-53951)

Vulnerability from cvelistv5 – Published: 2025-10-16 13:58 – Updated: 2025-10-16 14:37
VLAI?
Summary
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in Fortinet FortiDLP Agent's Outlookproxy plugin for Windows 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1 through 11.1.2 and 11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated attacker to escalate their privilege to LocalService via sending a crafted request to a local listening port.
CWE
  • CWE-22 - Escalation of privilege
Assigner
Impacted products
Vendor Product Version
Fortinet FortiDLP Affected: 11.5.1
Affected: 11.4.2 , ≤ 11.4.6 (semver)
Affected: 11.3.2 , ≤ 11.3.4 (semver)
Affected: 11.2.3
Affected: 11.2.0
Affected: 11.1.1 , ≤ 11.1.2 (semver)
Affected: 11.0.1
Affected: 10.5.1
Affected: 10.4.0
Affected: 10.3.1
    cpe:2.3:a:fortinet:fortidlp:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.3.1:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-53951",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-16T14:36:52.618969Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-16T14:37:00.457Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:fortinet:fortidlp:11.5.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.2.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.2.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.1.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.1.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.5.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.4.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.3.1:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "FortiDLP",
          "vendor": "Fortinet",
          "versions": [
            {
              "status": "affected",
              "version": "11.5.1"
            },
            {
              "lessThanOrEqual": "11.4.6",
              "status": "affected",
              "version": "11.4.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "11.3.4",
              "status": "affected",
              "version": "11.3.2",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "11.2.3"
            },
            {
              "status": "affected",
              "version": "11.2.0"
            },
            {
              "lessThanOrEqual": "11.1.2",
              "status": "affected",
              "version": "11.1.1",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "11.0.1"
            },
            {
              "status": "affected",
              "version": "10.5.1"
            },
            {
              "status": "affected",
              "version": "10.4.0"
            },
            {
              "status": "affected",
              "version": "10.3.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability [CWE-22] in Fortinet FortiDLP Agent\u0027s Outlookproxy plugin for Windows 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1 through 11.1.2 and  11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated attacker to escalate their privilege to LocalService via sending a crafted request to a local listening port."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:F/RL:O/RC:C",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "Escalation of privilege",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-16T13:58:21.749Z",
        "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
        "shortName": "fortinet"
      },
      "references": [
        {
          "name": "https://fortiguard.fortinet.com/psirt/FG-IR-25-628",
          "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-628"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to FortiDLP version 12.0.0 or above"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
    "assignerShortName": "fortinet",
    "cveId": "CVE-2025-53951",
    "datePublished": "2025-10-16T13:58:21.749Z",
    "dateReserved": "2025-07-15T09:52:08.702Z",
    "dateUpdated": "2025-10-16T14:37:00.457Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-54658 (GCVE-0-2025-54658)

Vulnerability from cvelistv5 – Published: 2025-10-16 13:55 – Updated: 2025-10-16 14:41
VLAI?
Summary
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in Fortinet FortiDLP Agent's Outlookproxy plugin for MacOS 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1 through 11.1.2 and 11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated attacker to escalate their privilege to Root via sending a crafted request to a local listening port.
CWE
  • CWE-22 - Escalation of privilege
Assigner
Impacted products
Vendor Product Version
Fortinet FortiDLP Affected: 11.5.1
Affected: 11.4.2 , ≤ 11.4.6 (semver)
Affected: 11.3.2 , ≤ 11.3.4 (semver)
Affected: 11.2.3
Affected: 11.2.0
Affected: 11.1.1 , ≤ 11.1.2 (semver)
Affected: 11.0.1
Affected: 10.5.1
Affected: 10.4.0
Affected: 10.3.1
    cpe:2.3:a:fortinet:fortidlp:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.3.1:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-54658",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-16T14:41:21.620546Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-16T14:41:32.560Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:fortinet:fortidlp:11.5.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.2.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.2.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.1.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.1.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.5.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.4.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.3.1:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "FortiDLP",
          "vendor": "Fortinet",
          "versions": [
            {
              "status": "affected",
              "version": "11.5.1"
            },
            {
              "lessThanOrEqual": "11.4.6",
              "status": "affected",
              "version": "11.4.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "11.3.4",
              "status": "affected",
              "version": "11.3.2",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "11.2.3"
            },
            {
              "status": "affected",
              "version": "11.2.0"
            },
            {
              "lessThanOrEqual": "11.1.2",
              "status": "affected",
              "version": "11.1.1",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "11.0.1"
            },
            {
              "status": "affected",
              "version": "10.5.1"
            },
            {
              "status": "affected",
              "version": "10.4.0"
            },
            {
              "status": "affected",
              "version": "10.3.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability [CWE-22] in Fortinet FortiDLP Agent\u0027s Outlookproxy plugin for MacOS 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1 through 11.1.2 and 11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated attacker to escalate their privilege to Root via sending a crafted request to a local listening port."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "Escalation of privilege",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-16T13:55:28.898Z",
        "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
        "shortName": "fortinet"
      },
      "references": [
        {
          "name": "https://fortiguard.fortinet.com/psirt/FG-IR-25-628",
          "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-628"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to FortiDLP version 12.0.0 or above"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
    "assignerShortName": "fortinet",
    "cveId": "CVE-2025-54658",
    "datePublished": "2025-10-16T13:55:28.898Z",
    "dateReserved": "2025-07-28T09:23:38.062Z",
    "dateUpdated": "2025-10-16T14:41:32.560Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-46752 (GCVE-0-2025-46752)

Vulnerability from nvd – Published: 2025-10-16 14:00 – Updated: 2025-10-16 14:20
VLAI?
Summary
A insertion of sensitive information into log file in Fortinet FortiDLP 12.0.0 through 12.0.5, 11.5.1, 11.4.6, 11.4.5 allows attacker to information disclosure via re-using the enrollment code.
CWE
Assigner
Impacted products
Vendor Product Version
Fortinet FortiDLP Affected: 12.0.4 , ≤ 12.0.5 (semver)
Affected: 12.0.2
Affected: 12.0.0
Affected: 11.5.1
Affected: 11.4.5 , ≤ 11.4.6 (semver)
    cpe:2.3:a:fortinet:fortidlp:12.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:12.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:12.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:12.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.5:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-46752",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-16T14:20:20.963552Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-16T14:20:31.156Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:fortinet:fortidlp:12.0.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:12.0.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:12.0.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:12.0.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.5.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.5:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "FortiDLP",
          "vendor": "Fortinet",
          "versions": [
            {
              "lessThanOrEqual": "12.0.5",
              "status": "affected",
              "version": "12.0.4",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "12.0.2"
            },
            {
              "status": "affected",
              "version": "12.0.0"
            },
            {
              "status": "affected",
              "version": "11.5.1"
            },
            {
              "lessThanOrEqual": "11.4.6",
              "status": "affected",
              "version": "11.4.5",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A insertion of sensitive information into log file in Fortinet FortiDLP 12.0.0 through 12.0.5, 11.5.1, 11.4.6, 11.4.5 allows attacker to information disclosure via re-using the enrollment code."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:P/RL:U/RC:C",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-532",
              "description": "Information disclosure",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-16T14:00:30.930Z",
        "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
        "shortName": "fortinet"
      },
      "references": [
        {
          "name": "https://fortiguard.fortinet.com/psirt/FG-IR-25-160",
          "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-160"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to FortiDLP version 12.1.0 or above"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
    "assignerShortName": "fortinet",
    "cveId": "CVE-2025-46752",
    "datePublished": "2025-10-16T14:00:30.930Z",
    "dateReserved": "2025-04-29T00:20:46.508Z",
    "dateUpdated": "2025-10-16T14:20:31.156Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-53950 (GCVE-0-2025-53950)

Vulnerability from nvd – Published: 2025-10-16 14:00 – Updated: 2025-10-16 14:22
VLAI?
Summary
An Exposure of Private Personal Information ('Privacy Violation') vulnerability [CWE-359] in Fortinet FortiDLP Agent's Outlookproxy plugin for MacOS and Windows 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1. through 11.1.2 and 11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated administrator to collect current user's email information.
CWE
Assigner
Impacted products
Vendor Product Version
Fortinet FortiDLP Affected: 11.5.1
Affected: 11.4.2 , ≤ 11.4.6 (semver)
Affected: 11.3.2 , ≤ 11.3.4 (semver)
Affected: 11.2.3
Affected: 11.2.0
Affected: 11.1.1 , ≤ 11.1.2 (semver)
Affected: 11.0.1
Affected: 10.5.1
Affected: 10.4.0
Affected: 10.3.1
    cpe:2.3:a:fortinet:fortidlp:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.3.1:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-53950",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-16T14:22:49.612036Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-16T14:22:55.551Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:fortinet:fortidlp:11.5.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.2.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.2.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.1.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.1.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.5.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.4.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.3.1:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "FortiDLP",
          "vendor": "Fortinet",
          "versions": [
            {
              "status": "affected",
              "version": "11.5.1"
            },
            {
              "lessThanOrEqual": "11.4.6",
              "status": "affected",
              "version": "11.4.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "11.3.4",
              "status": "affected",
              "version": "11.3.2",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "11.2.3"
            },
            {
              "status": "affected",
              "version": "11.2.0"
            },
            {
              "lessThanOrEqual": "11.1.2",
              "status": "affected",
              "version": "11.1.1",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "11.0.1"
            },
            {
              "status": "affected",
              "version": "10.5.1"
            },
            {
              "status": "affected",
              "version": "10.4.0"
            },
            {
              "status": "affected",
              "version": "10.3.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An Exposure of Private Personal Information (\u0027Privacy Violation\u0027) vulnerability [CWE-359] in Fortinet FortiDLP Agent\u0027s Outlookproxy plugin for MacOS and Windows 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1. through 11.1.2 and 11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated administrator to collect current user\u0027s email information."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N/E:F/RL:O/RC:C",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-359",
              "description": "Information disclosure",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-16T14:00:05.329Z",
        "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
        "shortName": "fortinet"
      },
      "references": [
        {
          "name": "https://fortiguard.fortinet.com/psirt/FG-IR-25-639",
          "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-639"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to FortiDLP version 12.0.0 or above"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
    "assignerShortName": "fortinet",
    "cveId": "CVE-2025-53950",
    "datePublished": "2025-10-16T14:00:05.329Z",
    "dateReserved": "2025-07-15T09:52:08.702Z",
    "dateUpdated": "2025-10-16T14:22:55.551Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-53951 (GCVE-0-2025-53951)

Vulnerability from nvd – Published: 2025-10-16 13:58 – Updated: 2025-10-16 14:37
VLAI?
Summary
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in Fortinet FortiDLP Agent's Outlookproxy plugin for Windows 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1 through 11.1.2 and 11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated attacker to escalate their privilege to LocalService via sending a crafted request to a local listening port.
CWE
  • CWE-22 - Escalation of privilege
Assigner
Impacted products
Vendor Product Version
Fortinet FortiDLP Affected: 11.5.1
Affected: 11.4.2 , ≤ 11.4.6 (semver)
Affected: 11.3.2 , ≤ 11.3.4 (semver)
Affected: 11.2.3
Affected: 11.2.0
Affected: 11.1.1 , ≤ 11.1.2 (semver)
Affected: 11.0.1
Affected: 10.5.1
Affected: 10.4.0
Affected: 10.3.1
    cpe:2.3:a:fortinet:fortidlp:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.3.1:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-53951",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-16T14:36:52.618969Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-16T14:37:00.457Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:fortinet:fortidlp:11.5.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.2.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.2.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.1.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.1.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.5.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.4.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.3.1:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "FortiDLP",
          "vendor": "Fortinet",
          "versions": [
            {
              "status": "affected",
              "version": "11.5.1"
            },
            {
              "lessThanOrEqual": "11.4.6",
              "status": "affected",
              "version": "11.4.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "11.3.4",
              "status": "affected",
              "version": "11.3.2",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "11.2.3"
            },
            {
              "status": "affected",
              "version": "11.2.0"
            },
            {
              "lessThanOrEqual": "11.1.2",
              "status": "affected",
              "version": "11.1.1",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "11.0.1"
            },
            {
              "status": "affected",
              "version": "10.5.1"
            },
            {
              "status": "affected",
              "version": "10.4.0"
            },
            {
              "status": "affected",
              "version": "10.3.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability [CWE-22] in Fortinet FortiDLP Agent\u0027s Outlookproxy plugin for Windows 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1 through 11.1.2 and  11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated attacker to escalate their privilege to LocalService via sending a crafted request to a local listening port."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:F/RL:O/RC:C",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "Escalation of privilege",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-16T13:58:21.749Z",
        "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
        "shortName": "fortinet"
      },
      "references": [
        {
          "name": "https://fortiguard.fortinet.com/psirt/FG-IR-25-628",
          "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-628"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to FortiDLP version 12.0.0 or above"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
    "assignerShortName": "fortinet",
    "cveId": "CVE-2025-53951",
    "datePublished": "2025-10-16T13:58:21.749Z",
    "dateReserved": "2025-07-15T09:52:08.702Z",
    "dateUpdated": "2025-10-16T14:37:00.457Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-54658 (GCVE-0-2025-54658)

Vulnerability from nvd – Published: 2025-10-16 13:55 – Updated: 2025-10-16 14:41
VLAI?
Summary
An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in Fortinet FortiDLP Agent's Outlookproxy plugin for MacOS 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1 through 11.1.2 and 11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated attacker to escalate their privilege to Root via sending a crafted request to a local listening port.
CWE
  • CWE-22 - Escalation of privilege
Assigner
Impacted products
Vendor Product Version
Fortinet FortiDLP Affected: 11.5.1
Affected: 11.4.2 , ≤ 11.4.6 (semver)
Affected: 11.3.2 , ≤ 11.3.4 (semver)
Affected: 11.2.3
Affected: 11.2.0
Affected: 11.1.1 , ≤ 11.1.2 (semver)
Affected: 11.0.1
Affected: 10.5.1
Affected: 10.4.0
Affected: 10.3.1
    cpe:2.3:a:fortinet:fortidlp:11.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:11.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:fortinet:fortidlp:10.3.1:*:*:*:*:*:*:*
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-54658",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-16T14:41:21.620546Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-16T14:41:32.560Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:fortinet:fortidlp:11.5.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.6:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.5:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.4.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.4:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.3.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.2.3:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.2.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.1.2:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.1.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:11.0.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.5.1:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.4.0:*:*:*:*:*:*:*",
            "cpe:2.3:a:fortinet:fortidlp:10.3.1:*:*:*:*:*:*:*"
          ],
          "defaultStatus": "unaffected",
          "product": "FortiDLP",
          "vendor": "Fortinet",
          "versions": [
            {
              "status": "affected",
              "version": "11.5.1"
            },
            {
              "lessThanOrEqual": "11.4.6",
              "status": "affected",
              "version": "11.4.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "11.3.4",
              "status": "affected",
              "version": "11.3.2",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "11.2.3"
            },
            {
              "status": "affected",
              "version": "11.2.0"
            },
            {
              "lessThanOrEqual": "11.1.2",
              "status": "affected",
              "version": "11.1.1",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "11.0.1"
            },
            {
              "status": "affected",
              "version": "10.5.1"
            },
            {
              "status": "affected",
              "version": "10.4.0"
            },
            {
              "status": "affected",
              "version": "10.3.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability [CWE-22] in Fortinet FortiDLP Agent\u0027s Outlookproxy plugin for MacOS 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1 through 11.1.2 and 11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated attacker to escalate their privilege to Root via sending a crafted request to a local listening port."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "Escalation of privilege",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-16T13:55:28.898Z",
        "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
        "shortName": "fortinet"
      },
      "references": [
        {
          "name": "https://fortiguard.fortinet.com/psirt/FG-IR-25-628",
          "url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-628"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to FortiDLP version 12.0.0 or above"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
    "assignerShortName": "fortinet",
    "cveId": "CVE-2025-54658",
    "datePublished": "2025-10-16T13:55:28.898Z",
    "dateReserved": "2025-07-28T09:23:38.062Z",
    "dateUpdated": "2025-10-16T14:41:32.560Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CERTFR-2025-AVI-0871

Vulnerability from certfr_avis - Published: 2025-10-15 - Updated: 2025-10-15

De multiples vulnérabilités ont été découvertes dans les produits Fortinet. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Fortinet FortiDLP FortiDLP toutes versions 10.3.x, 10.4.x, 10.5.x, 11.0.x, 11.1.x, 11.2.x, 11.3.x, 11.4.x, 11.5.x, 12.0.x, 12.1.x
Fortinet FortiADC FortiADC toutes versions 6.2.x et 7.0.x
Fortinet FortiManager FortiManager Cloud versions postérieures à 7.0.1 et antérieures à 7.0.14
Fortinet FortiAnalyzer FortiAnalyzer Cloud versions postérieures à 7.2.1 et antérieures à 7.2.10
Fortinet FortiTester FortiTester toutes versions 4.2.x, 7.0.x, 7.1.x, 7.2.x et 7.3.x
Fortinet FortiManager FortiManager versions 7.6.x antérieures à 7.6.2
Fortinet FortiOS FortiOS versions 7.6.x antérieures à 7.6.4
Fortinet FortiVoice FortiVoice versions 6.0.7 à 6.0.12
Fortinet FortiClient FortiClientMac toutes versions 7.0.x
Fortinet FortiSOAR FortiSOAR on-premise toutes versions 7.3.x et 7.4.x
Fortinet FortiSIEM FortiSIEM versions 7.2.x antérieures à 7.2.3
Fortinet FortiPAM FortiPAM toutes versions 1.0.x, 1.1.x, 1.2.x et 1.3.x
Fortinet FortiSRA FortiSRA versions 1.5.x antérieures à 1.5.1
Fortinet FortiWeb FortiWeb toutes versions 6.4.x, 7.0.x et 7.2.x
Fortinet FortiDLP FortiDLP versions 12.2.x et antérieures à 12.2.3
Fortinet FortiManager FortiManager Cloud versions 7.6.x antérieures à 7.6.3
Fortinet FortiSOAR FortiSOAR on-premise versions 7.6.x antérieures à 7.6.2
Fortinet FortiNDR FortiNDR toutes versions 1.5.x, 7.0.x, 7.1.x et 7.2.x
Fortinet FortiClient FortiClientWindows versions 7.4.x antérieures à 7.4.4
Fortinet FortiAnalyzer FortiAnalyzer Cloud versions postérieures à 7.4.1 et antérieures à 7.4.6
Fortinet FortiManager FortiManager versions 7.2.x antérieures à 7.2.10
Fortinet FortiVoice FortiVoice versions 7.0.x antérieures à 7.0.5
Fortinet FortiAnalyzer FortiAnalyzer versions 7.4.x antérieures à 7.4.7
Fortinet FortiClient FortiClientWindows versions 7.2.x antérieures à 7.2.12
Fortinet FortiManager FortiManager Cloud toutes versions 6.4.x
Fortinet FortiPAM FortiPAM versions 1.4.x antérieures à 1.4.3
Fortinet FortiManager FortiManager Cloud versions postérieures à 7.2.1 et antérieures à 7.2.10
Fortinet FortiPAM FortiPAM versions 1.5.x antérieures à 1.5.1
Fortinet FortiSIEM FortiSIEM toutes versions 6.2.x, 6.3.x, 6.4.x, 6.5.x, 6.6.x, 6.7.x, 7.0.x et 7.1.x
Fortinet FortiMail FortiMail versions 7.2.x antérieures à 7.2.7
Fortinet FortiSRA FortiSRA versions 1.4.x antérieures à 1.4.3
Fortinet FortiRecorder FortiRecorder versions 7.0.x antérieures à 7.0.5
Fortinet FortiWeb FortiWeb versions 7.4.x antérieures à 7.4.5
Fortinet FortiManager FortiManager versions 7.4.x antérieures à 7.4.6
Fortinet FortiADC FortiADC versions 7.2.x antérieures à 7.2.4
Fortinet FortiAnalyzer FortiAnalyzer versions 7.6.x antérieures à 7.6.4
Fortinet FortiClient FortiClientWindows toutes versions 7.0.x
Fortinet FortiIsolator FortiIsolator versions 2.4.x antérieures à 2.4.5
Fortinet FortiTester FortiTester version 7.4 antérieures à 7.4.3
Fortinet FortiVoice FortiVoice versions 6.4.x antérieures à 6.4.10
Fortinet FortiManager FortiManager Cloud versions postérieures à 7.4.1 et antérieures à 7.4.6
Fortinet FortiOS FortiOS toutes versions 6.0.x, 6.2.x, 6.4.x, 7.0.x, 7.2.x et 7.4.x
Fortinet FortiIsolator FortiIsolator toutes versions 2.3.x
Fortinet FortiADC FortiADC versions 7.1.x antérieures à 7.1.5
Fortinet FortiProxy FortiProxy toutes versions 1.0.x, 1.1.x, 1.2.x, 2.0.x, 7.0.x, 7.2.x et 7.4.x
Fortinet FortiAnalyzer FortiAnalyzer Cloud toutes versions 6.4.x
Fortinet FortiAnalyzer FortiAnalyzer toutes versions 6.0.x, 6.2.x, 6.4.x, 7.0.x et 7.2.x
Fortinet FortiSwitch FortiSwitchManager versions 7.2.x antérieures à 7.2.6
Fortinet FortiManager FortiManager versions 7.0.x antérieures à 7.0.14
Fortinet FortiManager FortiManager toutes versions 6.0.x, 6.2.x et 6.4.x
Fortinet FortiWeb FortiWeb versions 7.6.x antérieures à 7.6.1
Fortinet FortiNDR FortiNDR versions 7.6.x antérieures à 7.6.2
Fortinet FortiProxy FortiProxy versions 7.6.x antérieures à 7.6.4
Fortinet FortiADC FortiADC versions 7.4.x antérieures à 7.4.1
Fortinet FortiNDR FortiNDR versions 7.4.x antérieures à 7.4.9
Fortinet FortiSwitch FortiSwitchManager versions 7.0.x antérieures à 7.0.4
Fortinet FortiMail FortiMail versions 7.4.x antérieures à 7.4.3
Fortinet FortiRecorder FortiRecorder versions 7.2.x antérieures à 7.2.2
Fortinet FortiClient FortiClientMac versions 7.4.x antérieures à 7.4.4
Fortinet FortiAnalyzer FortiAnalyzer Cloud versions postérieures à 7.0.1 et antérieures à 7.0.14
Fortinet FortiClient FortiClientMac versions 7.2.x antérieures à 7.2.12
Fortinet FortiSOAR FortiSOAR on-premise versions 7.5.x antérieures à 7.5.2
References
Bulletin de sécurité Fortinet FG-IR-24-372 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-24-412 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-24-228 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-24-280 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-25-685 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-24-452 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-24-487 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-25-639 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-25-037 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-25-684 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-23-354 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-24-041 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-25-198 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-25-160 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-24-361 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-25-861 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-24-542 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-25-771 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-25-010 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-25-378 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-24-442 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-25-664 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-25-756 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-25-126 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-25-628 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-24-457 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-24-062 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-24-546 2025-10-14 vendor-advisory
Bulletin de sécurité Fortinet FG-IR-25-653 2025-10-14 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "FortiDLP toutes versions 10.3.x, 10.4.x, 10.5.x, 11.0.x, 11.1.x, 11.2.x, 11.3.x, 11.4.x, 11.5.x, 12.0.x, 12.1.x",
      "product": {
        "name": "FortiDLP",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiADC toutes versions 6.2.x et 7.0.x",
      "product": {
        "name": "FortiADC",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiManager Cloud versions post\u00e9rieures \u00e0 7.0.1 et ant\u00e9rieures \u00e0 7.0.14",
      "product": {
        "name": "FortiManager",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiAnalyzer Cloud versions post\u00e9rieures \u00e0 7.2.1 et ant\u00e9rieures \u00e0 7.2.10",
      "product": {
        "name": "FortiAnalyzer",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiTester toutes versions 4.2.x, 7.0.x, 7.1.x, 7.2.x et 7.3.x",
      "product": {
        "name": "FortiTester",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiManager versions 7.6.x ant\u00e9rieures \u00e0 7.6.2",
      "product": {
        "name": "FortiManager",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiOS versions 7.6.x ant\u00e9rieures \u00e0 7.6.4",
      "product": {
        "name": "FortiOS",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiVoice versions 6.0.7 \u00e0 6.0.12",
      "product": {
        "name": "FortiVoice",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiClientMac toutes versions 7.0.x",
      "product": {
        "name": "FortiClient",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiSOAR on-premise toutes versions 7.3.x et 7.4.x",
      "product": {
        "name": "FortiSOAR",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiSIEM versions 7.2.x ant\u00e9rieures \u00e0 7.2.3",
      "product": {
        "name": "FortiSIEM",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiPAM toutes versions 1.0.x, 1.1.x, 1.2.x et 1.3.x",
      "product": {
        "name": "FortiPAM",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiSRA versions 1.5.x ant\u00e9rieures \u00e0 1.5.1",
      "product": {
        "name": "FortiSRA",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiWeb toutes versions 6.4.x, 7.0.x et 7.2.x",
      "product": {
        "name": "FortiWeb",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiDLP versions 12.2.x et ant\u00e9rieures \u00e0 12.2.3",
      "product": {
        "name": "FortiDLP",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiManager Cloud versions 7.6.x ant\u00e9rieures \u00e0 7.6.3",
      "product": {
        "name": "FortiManager",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiSOAR on-premise versions 7.6.x ant\u00e9rieures \u00e0 7.6.2",
      "product": {
        "name": "FortiSOAR",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiNDR toutes versions 1.5.x, 7.0.x, 7.1.x et 7.2.x",
      "product": {
        "name": "FortiNDR",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiClientWindows versions 7.4.x ant\u00e9rieures \u00e0 7.4.4",
      "product": {
        "name": "FortiClient",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiAnalyzer Cloud versions post\u00e9rieures \u00e0 7.4.1 et ant\u00e9rieures \u00e0 7.4.6",
      "product": {
        "name": "FortiAnalyzer",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiManager versions 7.2.x ant\u00e9rieures \u00e0 7.2.10",
      "product": {
        "name": "FortiManager",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiVoice versions 7.0.x ant\u00e9rieures \u00e0 7.0.5",
      "product": {
        "name": "FortiVoice",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiAnalyzer versions 7.4.x ant\u00e9rieures \u00e0 7.4.7",
      "product": {
        "name": "FortiAnalyzer",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiClientWindows versions 7.2.x ant\u00e9rieures \u00e0 7.2.12",
      "product": {
        "name": "FortiClient",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiManager Cloud toutes versions 6.4.x",
      "product": {
        "name": "FortiManager",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiPAM versions 1.4.x ant\u00e9rieures \u00e0 1.4.3",
      "product": {
        "name": "FortiPAM",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiManager Cloud versions post\u00e9rieures \u00e0 7.2.1 et ant\u00e9rieures \u00e0 7.2.10",
      "product": {
        "name": "FortiManager",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiPAM versions 1.5.x ant\u00e9rieures \u00e0 1.5.1",
      "product": {
        "name": "FortiPAM",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiSIEM toutes versions 6.2.x, 6.3.x, 6.4.x, 6.5.x, 6.6.x, 6.7.x, 7.0.x et 7.1.x",
      "product": {
        "name": "FortiSIEM",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiMail versions 7.2.x ant\u00e9rieures \u00e0 7.2.7",
      "product": {
        "name": "FortiMail",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiSRA versions 1.4.x ant\u00e9rieures \u00e0 1.4.3",
      "product": {
        "name": "FortiSRA",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiRecorder versions 7.0.x ant\u00e9rieures \u00e0 7.0.5",
      "product": {
        "name": "FortiRecorder",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiWeb versions 7.4.x ant\u00e9rieures \u00e0 7.4.5",
      "product": {
        "name": "FortiWeb",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiManager versions 7.4.x ant\u00e9rieures \u00e0 7.4.6",
      "product": {
        "name": "FortiManager",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiADC versions 7.2.x ant\u00e9rieures \u00e0 7.2.4",
      "product": {
        "name": "FortiADC",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiAnalyzer versions 7.6.x ant\u00e9rieures \u00e0 7.6.4",
      "product": {
        "name": "FortiAnalyzer",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiClientWindows toutes versions 7.0.x",
      "product": {
        "name": "FortiClient",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiIsolator versions 2.4.x ant\u00e9rieures \u00e0 2.4.5",
      "product": {
        "name": "FortiIsolator",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiTester version 7.4 ant\u00e9rieures \u00e0  7.4.3",
      "product": {
        "name": "FortiTester",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiVoice versions 6.4.x ant\u00e9rieures \u00e0 6.4.10",
      "product": {
        "name": "FortiVoice",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiManager Cloud versions post\u00e9rieures \u00e0 7.4.1 et ant\u00e9rieures \u00e0 7.4.6",
      "product": {
        "name": "FortiManager",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiOS toutes versions 6.0.x, 6.2.x, 6.4.x, 7.0.x, 7.2.x et 7.4.x",
      "product": {
        "name": "FortiOS",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiIsolator toutes versions 2.3.x",
      "product": {
        "name": "FortiIsolator",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiADC versions 7.1.x ant\u00e9rieures \u00e0 7.1.5",
      "product": {
        "name": "FortiADC",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiProxy toutes versions 1.0.x, 1.1.x, 1.2.x, 2.0.x, 7.0.x, 7.2.x et 7.4.x",
      "product": {
        "name": "FortiProxy",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiAnalyzer Cloud toutes versions 6.4.x",
      "product": {
        "name": "FortiAnalyzer",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiAnalyzer toutes versions 6.0.x, 6.2.x, 6.4.x, 7.0.x et 7.2.x",
      "product": {
        "name": "FortiAnalyzer",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiSwitchManager versions 7.2.x ant\u00e9rieures \u00e0 7.2.6",
      "product": {
        "name": "FortiSwitch",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiManager versions 7.0.x ant\u00e9rieures \u00e0 7.0.14",
      "product": {
        "name": "FortiManager",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiManager toutes versions 6.0.x, 6.2.x et 6.4.x",
      "product": {
        "name": "FortiManager",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiWeb versions 7.6.x ant\u00e9rieures \u00e0 7.6.1",
      "product": {
        "name": "FortiWeb",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiNDR versions 7.6.x ant\u00e9rieures \u00e0 7.6.2",
      "product": {
        "name": "FortiNDR",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiProxy versions 7.6.x ant\u00e9rieures \u00e0 7.6.4",
      "product": {
        "name": "FortiProxy",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiADC versions 7.4.x ant\u00e9rieures \u00e0 7.4.1",
      "product": {
        "name": "FortiADC",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiNDR versions 7.4.x ant\u00e9rieures \u00e0 7.4.9",
      "product": {
        "name": "FortiNDR",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiSwitchManager versions 7.0.x ant\u00e9rieures \u00e0 7.0.4",
      "product": {
        "name": "FortiSwitch",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiMail versions 7.4.x ant\u00e9rieures \u00e0 7.4.3",
      "product": {
        "name": "FortiMail",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiRecorder versions 7.2.x ant\u00e9rieures \u00e0 7.2.2",
      "product": {
        "name": "FortiRecorder",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiClientMac versions 7.4.x ant\u00e9rieures \u00e0 7.4.4",
      "product": {
        "name": "FortiClient",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiAnalyzer Cloud versions post\u00e9rieures \u00e0 7.0.1 et ant\u00e9rieures \u00e0 7.0.14",
      "product": {
        "name": "FortiAnalyzer",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiClientMac versions 7.2.x ant\u00e9rieures \u00e0 7.2.12",
      "product": {
        "name": "FortiClient",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    },
    {
      "description": "FortiSOAR on-premise versions 7.5.x ant\u00e9rieures \u00e0 7.5.2",
      "product": {
        "name": "FortiSOAR",
        "vendor": {
          "name": "Fortinet",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-58325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58325"
    },
    {
      "name": "CVE-2025-46752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46752"
    },
    {
      "name": "CVE-2025-31365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31365"
    },
    {
      "name": "CVE-2025-49201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49201"
    },
    {
      "name": "CVE-2025-54822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54822"
    },
    {
      "name": "CVE-2025-57741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-57741"
    },
    {
      "name": "CVE-2025-58903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58903"
    },
    {
      "name": "CVE-2025-31514",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31514"
    },
    {
      "name": "CVE-2025-25253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25253"
    },
    {
      "name": "CVE-2024-33507",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33507"
    },
    {
      "name": "CVE-2025-25255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25255"
    },
    {
      "name": "CVE-2023-46718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46718"
    },
    {
      "name": "CVE-2025-47890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47890"
    },
    {
      "name": "CVE-2025-54988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
    },
    {
      "name": "CVE-2024-26008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26008"
    },
    {
      "name": "CVE-2025-25252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25252"
    },
    {
      "name": "CVE-2024-48891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48891"
    },
    {
      "name": "CVE-2025-59921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59921"
    },
    {
      "name": "CVE-2025-53951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53951"
    },
    {
      "name": "CVE-2025-53950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53950"
    },
    {
      "name": "CVE-2025-58324",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58324"
    },
    {
      "name": "CVE-2025-53845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53845"
    },
    {
      "name": "CVE-2024-50571",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50571"
    },
    {
      "name": "CVE-2025-46774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46774"
    },
    {
      "name": "CVE-2025-31366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31366"
    },
    {
      "name": "CVE-2025-57716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-57716"
    },
    {
      "name": "CVE-2024-47569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47569"
    },
    {
      "name": "CVE-2025-22258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22258"
    },
    {
      "name": "CVE-2025-57740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-57740"
    },
    {
      "name": "CVE-2025-54973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54973"
    },
    {
      "name": "CVE-2025-54658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54658"
    }
  ],
  "initial_release_date": "2025-10-15T00:00:00",
  "last_revision_date": "2025-10-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0871",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-10-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Fortinet. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Fortinet",
  "vendor_advisories": [
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-372",
      "url": "https://www.fortiguard.com/psirt/FG-IR-24-372"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-412",
      "url": "https://www.fortiguard.com/psirt/FG-IR-24-412"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-228",
      "url": "https://www.fortiguard.com/psirt/FG-IR-24-228"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-280",
      "url": "https://www.fortiguard.com/psirt/FG-IR-24-280"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-685",
      "url": "https://www.fortiguard.com/psirt/FG-IR-25-685"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-452",
      "url": "https://www.fortiguard.com/psirt/FG-IR-24-452"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-487",
      "url": "https://www.fortiguard.com/psirt/FG-IR-24-487"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-639",
      "url": "https://www.fortiguard.com/psirt/FG-IR-25-639"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-037",
      "url": "https://www.fortiguard.com/psirt/FG-IR-25-037"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-684",
      "url": "https://www.fortiguard.com/psirt/FG-IR-25-684"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-23-354",
      "url": "https://www.fortiguard.com/psirt/FG-IR-23-354"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-041",
      "url": "https://www.fortiguard.com/psirt/FG-IR-24-041"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-198",
      "url": "https://www.fortiguard.com/psirt/FG-IR-25-198"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-160",
      "url": "https://www.fortiguard.com/psirt/FG-IR-25-160"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-361",
      "url": "https://www.fortiguard.com/psirt/FG-IR-24-361"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-861",
      "url": "https://www.fortiguard.com/psirt/FG-IR-25-861"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-542",
      "url": "https://www.fortiguard.com/psirt/FG-IR-24-542"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-771",
      "url": "https://www.fortiguard.com/psirt/FG-IR-25-771"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-010",
      "url": "https://www.fortiguard.com/psirt/FG-IR-25-010"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-378",
      "url": "https://www.fortiguard.com/psirt/FG-IR-25-378"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-442",
      "url": "https://www.fortiguard.com/psirt/FG-IR-24-442"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-664",
      "url": "https://www.fortiguard.com/psirt/FG-IR-25-664"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-756",
      "url": "https://www.fortiguard.com/psirt/FG-IR-25-756"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-126",
      "url": "https://www.fortiguard.com/psirt/FG-IR-25-126"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-628",
      "url": "https://www.fortiguard.com/psirt/FG-IR-25-628"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-457",
      "url": "https://www.fortiguard.com/psirt/FG-IR-24-457"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-062",
      "url": "https://www.fortiguard.com/psirt/FG-IR-24-062"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-24-546",
      "url": "https://www.fortiguard.com/psirt/FG-IR-24-546"
    },
    {
      "published_at": "2025-10-14",
      "title": "Bulletin de s\u00e9curit\u00e9 Fortinet FG-IR-25-653",
      "url": "https://www.fortiguard.com/psirt/FG-IR-25-653"
    }
  ]
}