Skip to main content
See every side of every news story
Published loading...Updated

Fortinet Finally Cops to Critical Bug Under Active Exploit

The flaw lets attackers create local admin accounts on FortiWeb devices without authentication, with attacks originating globally and fixed in version 8.0.2, researchers said.

  • On October 6, researchers first observed a Fortinet FortiWeb path traversal flaw being actively exploited to create new administrative users without authentication, and Fortinet released FortiWeb 8.0.2 to fix it, urging administrators to update soon.
  • The vulnerability stems from a path traversal at /api/v2.0/cmdb/system/admin%3f/../../../../../cgi-bin/fwbcgi that accepts HTTP POST requests and affects FortiWeb versions 8.0.1 and earlier.
  • Evidence shows researchers documented created usernames including Testpoint, trader1, and trader, with passwords like 3eMIXX43, and attacks from IPs such as 107.152.41.19, 144.31.1.63, while watchTowr Labs posted a video demonstrating a successful admin login.
  • BleepingComputer reported no matching Fortinet PSIRT disclosure for the exploited flaw and urges administrators to restrict internet access, review logs for fwbcgi requests, and investigate suspicious activity.
  • WatchTowr published a tool called "FortiWeb Authentication Bypass Artifact Generator," which attempts to exploit the flaw by creating an 8-character UUID-derived username, raising dual-use risks as attacks grow globally.
Insights by Ground AI

13 Articles

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 100% of the sources are Center
100% Center

Factuality Info Icon

To view factuality data please Upgrade to Premium

Ownership

Info Icon

To view ownership data please Upgrade to Vantage

BleepingComputer broke the news in on Thursday, November 13, 2025.
Too Big Arrow Icon
Sources are mostly out of (0)

Similar News Topics

News
Feed Dots Icon
For You
Search Icon
Search
Blindspot LogoBlindspotLocal