Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

North Korean hackers turn JSON service into covert malware delivery channel

Five people plead guilty to helping North Koreans infiltrate US companies as ‘remote IT workers’

Researchers discover serious AI bug exposing Meta, Nvidia, and Microsoft inference frameworks

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Patched Fortinet FortiWeb flaw exploited in attack to create administrator account
Identity

Patched Fortinet FortiWeb flaw exploited in attack to create administrator account

userBy userNovember 14, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 14, 2025Ravi LakshmananThreat Intelligence/Vulnerability

Cybersecurity researchers have warned that the Fortinet Fortiweb WAF has an authentication bypass vulnerability that could allow an attacker to take over the administrator account and fully compromise the device.

“The watchTowr team has observed active and indiscriminate field exploitation of vulnerabilities that appear to have been silently patched in Fortinet’s FortiWeb products,” Benjamin Harris, CEO and founder of watchTowr, said in a statement.

“This vulnerability, patched in version 8.0.2, allows an attacker to perform actions as a privileged user. The actual exploit focuses on adding a new administrator account as the basic persistence mechanism for the attacker.”

DFIR retainer service

The cybersecurity firm said it was able to reproduce the vulnerability and create a working proof of concept (POC). We also released an authentication bypass artifact generation tool to help identify susceptible devices.

According to details shared by PwnDefend’s Defused and security researcher Daniel Card, the attacker behind this exploit was found to be sending a payload to “/api/v2.0/cmdb/system/admin%3F/../../../../../cgi-bin/fwbcgi” via an HTTP POST request to create an administrator account.

Some of the administrator usernames and passwords created by payloads detected in the wild are:

Test point / AFodIUU3Sszp5 trader1 / 3eMIXX43 trader / 3eMIXX43 test1234point / AFT3$tH4ck test point / AFT3$tH4ck test point / AFT3$tH4ckmet0d4yaga!n

The origin and identity of the attackers behind the attack remain unknown. The exploit was first detected early last month. At the time of writing, Fortinet has not assigned a CVE identifier or published any advisories to the PSIRT feed.

CIS build kit

Hacker News has reached out to Fortinet for comment and will update the article if we hear back.

Rapid7, which is calling on organizations running Fortinet FortiWeb versions earlier than 8.0.2 to urgently address this vulnerability, said it has confirmed that a suspected zero-day exploit targeting Fortinet was marketed on a popular blackhat forum on November 6, 2025. It is not clear at this time whether this is the same exploit.

“While we await comment from Fortinet, users and businesses are now faced with the familiar process of looking for subtle signs of a previous breach, contacting Fortinet for more information, and patching them if they haven’t already done so,” Harris said. “However, given the observed indiscriminate exploitation; […]An unpatched appliance may already be compromised. ”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCancer treatment for pets using cutting-edge technology
Next Article Europe’s KM3NeT neutrino telescope explores the origin of the universe
user
  • Website

Related Posts

North Korean hackers turn JSON service into covert malware delivery channel

November 14, 2025

Researchers discover serious AI bug exposing Meta, Nvidia, and Microsoft inference frameworks

November 14, 2025

Iranian hackers launch espionage operation ‘Spear Specter’ targeting national defense and government

November 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

North Korean hackers turn JSON service into covert malware delivery channel

Five people plead guilty to helping North Koreans infiltrate US companies as ‘remote IT workers’

Researchers discover serious AI bug exposing Meta, Nvidia, and Microsoft inference frameworks

Pine Labs receives enthusiastic reception from market with $440 million Indian IPO despite valuation cut

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.