First published: Tue May 13 2025(Updated: )
A missing authentication for critical function vulnerability [CWE-306] in FortiOS, FortiProxy, and FortiSwitchManager TACACS+ configured to use a remote TACACS+ server for authentication, that has itself been configured to use ASCII authentication may allow an attacker with knowledge of an existing admin account to access the device as a valid admin via an authentication bypass.
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | =. | |
FortiOS | >=7.4.4<=7.4.6 | |
Fortinet FortiProxy SSL VPN webmode | >=7.6.0<=7.6.1 | |
Fortinet FortiSwitchManager | =. |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22252 is considered a critical vulnerability due to the missing authentication for critical functions.
To fix CVE-2025-22252, upgrade your FortiOS, FortiProxy, or FortiSwitchManager to the recommended version as outlined in the vendor's guidance.
CVE-2025-22252 affects FortiOS, FortiProxy, and FortiSwitchManager when configured with a remote TACACS+ server using ASCII authentication.
You should upgrade FortiOS to version 7.6.1 or later, FortiProxy to version 7.6.2 or later, and FortiSwitchManager to version 7.2.6 or later.
Attackers may exploit CVE-2025-22252 to gain unauthorized access to critical functions due to the lack of proper authentication.