🛡️ Fortinet Monthly Recap | November 2025

Monatsübersicht November 2025.

📦 Firmware Updates

ProduktVersionTypDokumentation
FORTISRA1.7.2FeatureRelease Notes | Admin Guide
FORTIPAM1.7.2FeatureRelease Notes | Admin Guide
FORTITELEMETRYAGENT7.6.6PatchRelease Notes | Admin Guide
FORTIPROXY7.4.12PatchRelease Notes | Admin Guide
FORTIDDOS-F7.2.2FeatureRelease Notes | Admin Guide
FORTITESTER7.6.1PatchRelease Notes | Admin Guide
FORTISWITCHNMS1.13.1PatchRelease Notes | Admin Guide
FORTIADC7.4.9PatchRelease Notes | Admin Guide
FORTIPORTAL7.0.13PatchRelease Notes | Admin Guide
FORTIOS-6K7K7.0.18PatchRelease Notes | Admin Guide
FORTINDR7.4.10PatchRelease Notes | Admin Guide
FORTISANDBOX5.0.5PatchRelease Notes | Admin Guide
FORTIANALYZER7.0.15PatchRelease Notes | Admin Guide
FORTIMANAGER7.0.15PatchRelease Notes | Admin Guide
FORTIOS7.0.18PatchRelease Notes | Admin Guide
FORTISWITCHAXCHASSIS1.0.0MajorRelease Notes | Admin Guide
FORTIANALYZER-BIGDATA7.2.11PatchRelease Notes | Admin Guide
FORTISIEM7.1.9PatchRelease Notes | Admin Guide
FORTIWEB7.6.6PatchRelease Notes | Admin Guide
FORTIWEB7.4.11PatchRelease Notes | Admin Guide

⚠️ Sicherheitswarnungen (CVEs)

Kritische Schwachstellen (Score > 6.5) im November:

IDScoreBeschreibung (Betroffene Versionen)
CVE-2025-644469.8A relative path traversal vulnerability in Fortinet

FortiWeb
8.0.0 through 8.0.1,


FortiWeb
7.6.0 through 7.6.4,


FortiWeb
7.4.0 through 7.4.9,


FortiWeb
7.2.0 through 7.2.11,


FortiWeb
7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.
CVE-2025-463737.8A Heap-based Buffer Overflow vulnerability [CWE-122] in Fortinet

FortiClientWindows
7.4.0 through 7.4.3,


FortiClientWindows
7.2.0 through 7.2.8 may allow an authenticated local IPSec user to execute arbitrary code or commands via "fortips_74.sys". The attacker would need to bypass the Windows heap integrity protections
CVE-2025-477617.8An Exposed IOCTL with Insufficient Access Control vulnerability [CWE-782] in Fortinet

FortiClientWindows
7.4.0 through 7.4.3,


FortiClientWindows
7.2.0 through 7.2.9 may allow an authenticated local user to execute unauthorized code via fortips driver. Success of the attack would require bypassing the Windows memory protections such as Heap integrity and HSP. In addition,
it requires a valid and running VPN IPSec connection.
CVE-2025-538437.5A stack-based buffer overflow vulnerability in Fortinet

FortiOS
7.6.0 through 7.6.3,


FortiOS
7.4.0 through 7.4.8,


FortiOS
7.2 all versions,


FortiOS
7.0 all versions,


FortiOS
6.4 all versions

allows attacker to execute unauthorized code or commands via specially crafted packets
CVE-2025-580347.2An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] vulnerability in Fortinet

FortiWeb
8.0.0 through 8.0.1,


FortiWeb
7.6.0 through 7.6.5,


FortiWeb
7.4.0 through 7.4.10,


FortiWeb
7.2.0 through 7.2.11,


FortiWeb
7.0.0 through 7.0.11 may allow an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests or CLI commands.
CVE-2025-584137.5A stack-based buffer overflow vulnerability in Fortinet

FortiOS
7.6.0 through 7.6.3,


FortiOS
7.4.0 through 7.4.8,


FortiOS
7.2 all versions,


FortiOS
7.0 all versions,


FortiOS
6.4 all versions,


FortiOS
6.2 all versions,


FortiOS
6.0 all versions,


FortiSASE
25.3.b

allows attacker to execute unauthorized code or commands via specially crafted packets
CVE-2025-586928.8An improper neutralization of special elements used in an SQL Command ("SQL Injection") vulnerability [CWE-89] in Fortinet

FortiVoice
7.2.0 through 7.2.2,


FortiVoice
7.0.0 through 7.0.7 allows an authenticated attacker to execute unauthorized code or commands via specifically crafted HTTP or HTTPS requests.