FortiOS and FortiSwitchManager Code Execution Vulnerability (CVE-2025-25249)

Fortinet Product Security Team discovered a security vulnerability impacting FortiOS and FortiSwitchManager. Tracked as CVE-2025-25249, the vulnerability is a high-severity issue with a CVSS score of 7.3.

The heap-based buffer overflow vulnerability exists in FortiOS and FortiSwitchManager cw_acd daemon. The vulnerability may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.

The brain of Fortinet Security Fabric is its network operating system, FortiOS. The Security Fabric’s operating system, or software, connects all its parts and ensures tight integration throughout the deployment of the Security Fabric across an enterprise.

FortiSwitch Manager (FSWM) is an on-premises management platform by Fortinet designed to simplify the deployment and management of large-scale FortiSwitch Ethernet networks as a standalone solution, without requiring a FortiGate firewall. It provides centralized control and a consistent user experience with other Fortinet products.

Affected and Patched Versions

Version Affected Fixed
FortiOS 7.6 7.6.0 through 7.6.3 Upgrade to 7.6.4 or above
FortiOS 7.4 7.4.0 through 7.4.8 Upgrade to 7.4.9 or above
FortiOS 7.2 7.2.0 through 7.2.11 Upgrade to 7.2.12 or above
FortiOS 7.0 7.0.0 through 7.0.17 Upgrade to 7.0.18 or above
FortiOS 6.4 6.4.0 through 6.4.16 Upgrade to the upcoming 6.4.17 or above
FortiSASE 25.2 25.2.b Fortinet remediated this issue in version 25.2.c, and therefore, customers do not need to take any action.
FortiSASE 25.1.a 25.1.a.2 Migrate to a fixed release
FortiSASE 24.4 Not affected Not Applicable
FortiSASE 23.3 Not affected Not Applicable
FortiSASE 23.2 Not affected Not Applicable
FortiSASE 23.1 Not affected Not Applicable
FortiSASE 22 Not affected Not Applicable
FortiSwitchManager 7.2 7.2.0 through 7.2.6 Upgrade to 7.2.7 or above
FortiSwitchManager 7.0 7.0.0 through 7.0.5 Upgrade to 7.0.6 or above

Please refer to the Fortinet PSIRT Advisory (FG-IR-25-084) for more information.

Workaround

For each interface, remove “fabric” access. For example, change:

config system interface
edit "port1"
set allowaccess fabric ssh https
next
end

to:

config system interface
edit "port1"
set allowaccess ssh https
next
end

or disallow access to the capwap daemon:

For each interface with the “fabric” service, block CAPWAP-CONTROL access to ports 5246-5249 through a local-in policy.

config firewall service custom 
edit "CAPWAP-CONTROL" 
set udp-portrange 5246-5249 
next 
end 
config firewall addrgrp 
edit "CAPWAP_DEVICES_IPs" 
set member "my_allowed_addresses" 
end 
config firewall local-in-policy 
edit 1 (allow from trusted devices) 
set intf "port1" (where fabric is enabled) 
set srcaddr "CAPWAP_DEVICES_IPs" 
set dstaddr "all" 
set service "CAPWAP-CONTROL" 
set schedule "always" 
set action accept 
next 
edit 2 (block everyone else) 
set intf "port1" (where fabric is enabled) 
set srcaddr "all' 
set dstaddr "all" 
set service "CAPWAP-CONTROL" 
set schedule "always" 
set action deny 
next
end

Qualys Detection

Qualys customers can scan their devices with QID 44891 to detect vulnerable assets.

Please continue to follow Qualys Threat Protection for more coverage of the latest vulnerabilities.

Reference
https://fortiguard.fortinet.com/psirt/FG-IR-25-084