Explore tweets tagged as #Fortiweb
@h4x0r_dz
H4x0r.DZ 🇰🇵
14 days
Here we go, another crits on fori. Authentication bypass on FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager when SAML is on CVE-2025-59718 CVE-2025-59719 https://t.co/F8lCILYD8t
1
25
202
@N3mes1s
Giuseppe `N3mes1s`
1 month
CVE-2025-64446 - Root cause and exploit for FortiWeb Unauthenticated RCE via Path Traversal and CGI Auth Bypass #Pruva reproduction for the fortiweb unauth RCE Report: https://t.co/8RrWZkyq3o Advs: https://t.co/nP5Tz98IA3
2
29
161
@HunterMapping
Hunter
14 days
🚨Alert🚨:CVE-2025-59718 & CVE-2025-59719 : Critical Fortinet Flaw Risks Unauthenticated Admin Bypass via FortiCloud SSO SAML Forgery 📊2.3M Services are found on the https://t.co/ysWb28BTvF yearly. 🔗Hunter Link: https://t.co/Hvg185t0p0 👇Query HUNTER :
3
38
140
@N3mes1s
Giuseppe `N3mes1s`
1 month
CVE-2025-58034 - #pruva reproduction for Fortiweb Multiple OS command injection in API and CLI report: https://t.co/cQ49CezSqK Advs: https://t.co/w6yaMGAmAk
@stephenfewer
Stephen Fewer
1 month
We posted our AttackerKB @rapid7 Analysis of the new EITW FortiWeb command injection vuln, CVE-2025-58034. The patch fixes several command injections, so we reproduced the SAML config name injection, and popped a reverse root shell 🎯 Full details here: https://t.co/k6jCxogtIO
0
0
2
@The_Cyber_News
Cyber Security News
14 days
⚠️ FortiOS, FortiWeb, and FortiProxy Vulnerability Lets Attackers Bypass SSO Authentication Source: https://t.co/C5cAOSwyFi Fortinet has issued an urgent security advisory regarding a critical vulnerability affecting its FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager
2
147
416
@zoomeye_team
ZoomEye
13 days
🚨🚨CVE-2025-59718 & CVE-2025-59719: FortiCloud SSO Authentication Bypass Unauthenticated attackers may bypass FortiCloud SSO by abusing crafted SAML messages when the feature is enabled. ZoomEye Dork👉app="Fortinet FortiSwitch" || app="Fortinet FortiWeb" || app="Fortinet
0
39
135
@HackingTeam777
ӉѦСҠіИԌ ҬЄѦӍ
1 month
Fortinet 0day https://t.co/yPpLfdw5e6 An auth bypass + path traversal in Fortinet FortiWeb to create new administrative users on exposed devices without requiring authentication. Blog: • https://t.co/fppu4BFSFo https://t.co/PymhaAaInX Tweet: https://t.co/cfYL4RvM5R
@DefusedCyber
Defused
3 months
⚠️Unknown Fortinet exploit (possibly a CVE-2022-40684 variant) from 64.95.13.8 🇺🇸 ( BLNWX ) VirusTotal Detections: 0/95 🟢 JWT payload translates into: { "username": "admin", "profname": "prof_admin", "vdom": "root", "loginname": "admin" }
3
99
382
@cyberthint
Cyberthint
8 days
Actively Attacks Observed on #FortiGate Devices! The CVE-2025-59718 and CVE-2025-59719 vulnerabilities (CVSS 9.8) affecting #Fortinet products (FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager) allow attackers to bypass authentication entirely by manipulating SAML SSO,
0
2
3
@stephenfewer
Stephen Fewer
1 month
We now have a (draft) @metasploit exploit module for the recent Fortinet FortiWeb vulns, chaining CVE-2025-64446 (auth bypass) + CVE-2025-58034 (command injection) to achieve unauthenticated RCE with root privileges: https://t.co/Xh15JybxsC
3
70
351
@wazuh
Wazuh
22 days
Fortinet FortiWeb below 8.0.2 was affected by CVE-2025-64446, a critical auth-bypass flaw. Attackers can send crafted HTTP requests to gain admin access, potentially taking full control of the WAF. Update immediately and review admin activity. Read more: https://t.co/LIkdNi7Pjs
0
7
10
@_mailler
mailler
1 month
According to the attackers, they actually used the Fortinet FortiWeb CVE, CVE-2025-64446, which allows for admin accounts to be created when exploited. (itabidi usafi kwa hiyo server ASAP). https://t.co/bsIlIqwv3g List of the ~80 affected sites according to the TA.
@BRIGHTZEED
Bright Mawudor,PhD
1 month
Hackers decided to Deface about 40 .go.ke websites Clearly someone is sending a message. Defacing could just be a start. Who knows the extent of these hacks. This was clearly a server side or DNS Redirect. National Threat Intelligence vs Monitoring are two different things. What
5
70
184
@The_Cyber_News
Cyber Security News
1 month
🚨 PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild | Read more: https://t.co/0GJeSSGgH0 A proof-of-concept (PoC) exploit tool for CVE-2025-64446 has been publicly released on GitHub. This vulnerability, affecting FortiWeb devices from Fortinet,
1
17
67
@DefusedCyber
Defused
1 month
🚨 Fortinet has just released details on another exploited-in-the-wild FortiWeb vulnerability (CVE-2025-58034) This vulnerability is a "OS Command Injection vulnerability that may allow an authenticated attacker to execute unauthorized code" Track live exploits against FortiWeb
3
31
125
@HunterMapping
Hunter
1 month
🚨Alert🚨:CVE-2025-58034 : An Improper Neutralization of Special Elements used in an OS Command Vulnerability in Fortinet FortiWeb 📊10.5K Services are found on the https://t.co/ysWb28BTvF yearly. 🔗Hunter Link: https://t.co/4mKlSVjULJ 👇Query HUNTER :
1
15
38
@The_Cyber_News
Cyber Security News
1 month
⚠️ CISA Warns of Fortinet FortiWeb WAF Vulnerability Exploited in the Wild to Gain Admin Access Source: https://t.co/7hefUeM4nS CISA has issued an urgent alert about a critical vulnerability in Fortinet’s FortiWeb Web Application Firewall (WAF), actively exploited by threat
4
55
163
@The_Cyber_News
Cyber Security News
1 month
🚨 Critical FortiWeb WAF Flaw Exploited in the Wild, Enabling Full Admin Control Takeover Read more: https://t.co/PbXRTk3NIy Fortinet has issued an urgent advisory warning of a critical vulnerability in its FortiWeb web application firewall (WAF) product, which attackers are
0
28
91
@HackingTeam777
ӉѦСҠіИԌ ҬЄѦӍ
1 month
CVE-2025-58034: Fortinet FortiWeb OS Command Injection https://t.co/3ZfS6jK4MR As a logged in administrator, we can successfully trigger the authenticated command injection vulnerability and execute a netcat reverse shell with root priviledges. Affected versions: FortiWeb
1
18
100
@DefusedCyber
Defused
1 month
Top Exploited Honeypots Over The Weekend 🍯 🥇 FortiWeb 🥈 Oracle E-Business 🥉 F5 Big-IP In total we recorded over 1500 exploit events from Friday to Sunday. View live threat intelligence on our honeypots 👉 https://t.co/GXFaqghsXI
2
9
40
@zoomeye_team
ZoomEye
1 month
🚨🚨CVE-2025-58034 (CVSS 6.7) — New FortiWeb 0-Day Actively Exploited Authenticated attackers can pop the box with a single crafted HTTP request or CLI command – full unauthorized code execution. Search by vul.cve Filter👉vul.cve="CVE-2025-58034" ZoomEye Dork👉app="FortiWeb"
1
9
46