Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Europe’s auto workers need to be retrained for electrification

Palo Alto fixes GlobalProtect DoS flaw that could crash firewall without logging in

3km X-ray laser measures the hottest solid material on Earth

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Patched Fortinet FortiWeb flaw exploited in attack to create administrator account
Identity

Patched Fortinet FortiWeb flaw exploited in attack to create administrator account

userBy userNovember 14, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 14, 2025Ravi LakshmananThreat Intelligence/Vulnerability

Cybersecurity researchers have warned that the Fortinet Fortiweb WAF has an authentication bypass vulnerability that could allow an attacker to take over the administrator account and fully compromise the device.

“The watchTowr team has observed active and indiscriminate field exploitation of vulnerabilities that appear to have been silently patched in Fortinet’s FortiWeb products,” Benjamin Harris, CEO and founder of watchTowr, said in a statement.

“This vulnerability, patched in version 8.0.2, allows an attacker to perform actions as a privileged user. The actual exploit focuses on adding a new administrator account as the basic persistence mechanism for the attacker.”

DFIR retainer service

The cybersecurity firm said it was able to reproduce the vulnerability and create a working proof of concept (POC). We also released an authentication bypass artifact generation tool to help identify susceptible devices.

According to details shared by PwnDefend’s Defused and security researcher Daniel Card, the attacker behind this exploit was found to be sending a payload to “/api/v2.0/cmdb/system/admin%3F/../../../../../cgi-bin/fwbcgi” via an HTTP POST request to create an administrator account.

Some of the administrator usernames and passwords created by payloads detected in the wild are:

Test point / AFodIUU3Sszp5 trader1 / 3eMIXX43 trader / 3eMIXX43 test1234point / AFT3$tH4ck test point / AFT3$tH4ck test point / AFT3$tH4ckmet0d4yaga!n

The origin and identity of the attackers behind the attack remain unknown. The exploit was first detected early last month. At the time of writing, Fortinet has not assigned a CVE identifier or published any advisories to the PSIRT feed.

CIS build kit

Hacker News has reached out to Fortinet for comment and will update the article if we hear back.

Rapid7, which is calling on organizations running Fortinet FortiWeb versions earlier than 8.0.2 to urgently address this vulnerability, said it has confirmed that a suspected zero-day exploit targeting Fortinet was marketed on a popular blackhat forum on November 6, 2025. It is not clear at this time whether this is the same exploit.

“While we await comment from Fortinet, users and businesses are now faced with the familiar process of looking for subtle signs of a previous breach, contacting Fortinet for more information, and patching them if they haven’t already done so,” Harris said. “However, given the observed indiscriminate exploitation; […]An unpatched appliance may already be compromised. ”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCancer treatment for pets using cutting-edge technology
Next Article Europe’s KM3NeT neutrino telescope explores the origin of the universe
user
  • Website

Related Posts

Palo Alto fixes GlobalProtect DoS flaw that could crash firewall without logging in

January 15, 2026

Researchers null-root over 550 Kimwolf and Aisuru botnet command servers

January 14, 2026

AI agents are becoming a privilege escalation path

January 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Europe’s auto workers need to be retrained for electrification

Palo Alto fixes GlobalProtect DoS flaw that could crash firewall without logging in

3km X-ray laser measures the hottest solid material on Earth

Mira Murati’s startup Thinking Machines Lab loses two co-founders to OpenAI

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.