Home

Description

An Improper Privilege Management vulnerability [CWE-269] in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4 all versions, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions, FortiPAM 1.6.0, FortiPAM 1.5 all versions, FortiPAM 1.4 all versions, FortiPAM 1.3 all versions, FortiPAM 1.2 all versions, FortiPAM 1.1 all versions, FortiPAM 1.0 all versions, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4 all versions, FortiProxy 7.2 all versions, FortiProxy 7.0 all versions may allow an authenticated administrator to bypass the trusted host policy via crafted CLI command.

PUBLISHED Reserved 2025-07-30 | Published 2025-11-18 | Updated 2025-11-18 | Assigner fortinet




LOW: 1.8CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R

Problem types

Escalation of privilege

Product status

Default status
unaffected

7.6.0 (semver)
affected

7.4.0 (semver)
affected

7.2.0 (semver)
affected

7.0.0 (semver)
affected

Default status
unaffected

7.6.0 (semver)
affected

7.4.0 (semver)
affected

7.2.0 (semver)
affected

7.0.0 (semver)
affected

6.4.0 (semver)
affected

Default status
unaffected

1.6.0
affected

1.5.0 (semver)
affected

1.4.0 (semver)
affected

1.3.0 (semver)
affected

1.2.0
affected

1.1.0 (semver)
affected

1.0.0 (semver)
affected

References

fortiguard.fortinet.com/psirt/FG-IR-25-545

cve.org (CVE-2025-54821)

nvd.nist.gov (CVE-2025-54821)

Download JSON