<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Now-Patched-Fortinet-FortiWeb-Flaw-Exploited-in-Attacks-to/m-p/85640#M5207</link>
    <description>&lt;P&gt;A write up on the Fortinet exploit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fortinet finally published a security advisory on Friday for a critical FortiWeb path traversal vulnerability under active exploitation – but it appears digital intruders got a month's head start.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The bug, now tracked as&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2025-64446" target="_blank" rel="nofollow noopener"&gt;CVE-2025-64446&lt;/A&gt;, allows unauthenticated attackers to execute administrative commands on Fortinet's web application firewall product and fully take over vulnerable devices. It's fully patched in FortiWeb version 8.0.2, but it didn't even have a CVE assigned to it until Friday, when the vendor admitted&amp;nbsp;to having "observed this to be exploited in the wild."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://thehackernews.com/2025/11/fortinet-fortiweb-flaw-actively.html?is=edd1d96d3b429ca7eaae0b1f51ebed90b0ccb950b7b031b5d1ce47ea80ef8c52" target="_blank"&gt;https://thehackernews.com/2025/11/fortinet-fortiweb-flaw-actively.html?is=edd1d96d3b429ca7eaae0b1f51ebed90b0ccb950b7b031b5d1ce47ea80ef8c52&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 18 Nov 2025 21:18:21 GMT</pubDate>
    <dc:creator>dcontesti</dc:creator>
    <dc:date>2025-11-18T21:18:21Z</dc:date>
    <item>
      <title>Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Now-Patched-Fortinet-FortiWeb-Flaw-Exploited-in-Attacks-to/m-p/85640#M5207</link>
      <description>&lt;P&gt;A write up on the Fortinet exploit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fortinet finally published a security advisory on Friday for a critical FortiWeb path traversal vulnerability under active exploitation – but it appears digital intruders got a month's head start.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The bug, now tracked as&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2025-64446" target="_blank" rel="nofollow noopener"&gt;CVE-2025-64446&lt;/A&gt;, allows unauthenticated attackers to execute administrative commands on Fortinet's web application firewall product and fully take over vulnerable devices. It's fully patched in FortiWeb version 8.0.2, but it didn't even have a CVE assigned to it until Friday, when the vendor admitted&amp;nbsp;to having "observed this to be exploited in the wild."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://thehackernews.com/2025/11/fortinet-fortiweb-flaw-actively.html?is=edd1d96d3b429ca7eaae0b1f51ebed90b0ccb950b7b031b5d1ce47ea80ef8c52" target="_blank"&gt;https://thehackernews.com/2025/11/fortinet-fortiweb-flaw-actively.html?is=edd1d96d3b429ca7eaae0b1f51ebed90b0ccb950b7b031b5d1ce47ea80ef8c52&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 21:18:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Now-Patched-Fortinet-FortiWeb-Flaw-Exploited-in-Attacks-to/m-p/85640#M5207</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2025-11-18T21:18:21Z</dc:date>
    </item>
  </channel>
</rss>

