Arctic Wolf Security Bulletin
Arctic Wolf Security Bulletin

CVE-2025-64155: FortiSIEM Remote Unauthenticated Command Injection Vulnerability

On 13 January 2025, Fortinet released fixes for a critical-severity FortiSIEM vulnerability (CVE-2025-64155) that stems from improper neutralization of special elements used in OS commands within the phMonitor service (TCP/7900).
Arctic Wolf Security Bulletin
6 min read

On 13 January 2025, Fortinet released fixes for a critical-severity FortiSIEM vulnerability (CVE-2025-64155) that stems from improper neutralization of special elements used in OS commands within the phMonitor service (TCP/7900). An unauthenticated, remote threat actor can exploit this vulnerability via crafted TCP requests to execute unauthorized code or commands on affected systems. 

Horizon3, who had responsibly disclosed this vulnerability to Fortinet, demonstrated that CVE-2025-64155 can be weaponized to achieve full system takeover through command injection of tools such as curl, allowing an unauthenticated threat actor to write a reverse-shell payload to a file typically only writable by an admin user. This enables privilege escalation from admin to root. 

At the time of writing, Arctic Wolf has not observed exploitation of this vulnerability in the wild. However, the release of public technical details and a proof-of-concept (PoC) exploit lowers the barrier to exploitation, which may lead threat actors to weaponize this vulnerability in the future. 

Recommendation for CVE-2025-64155

Upgrade To Latest Fixed Version

Arctic Wolf strongly recommends that customers upgrade to the latest fixed version. 

Product  Affected Version  Fixed Version 
FortiSIEM Cloud  Not affected  Not applicable 
FortiSIEM 7.5  Not affected  Not applicable 
FortiSIEM 7.4  7.4.0  Upgrade to 7.4.1 or above 
FortiSIEM 7.3  7.3.0 through 7.3.4  Upgrade to 7.3.5 or above 
FortiSIEM 7.2  7.2.0 through 7.2.6  Upgrade to 7.2.7 or above 
FortiSIEM 7.1  7.1.0 through 7.1.8  Upgrade to 7.1.9 or above 
FortiSIEM 7.0  7.0.0 through 7.0.4  Migrate to a fixed release 
FortiSIEM 6.7  6.7.0 through 6.7.10  Migrate to a fixed release 

 

Note: CVE-2025-64155 does not impact Collector nodes, only Super and Worker nodes. 

Please follow your organization’s patching and testing guidelines to minimize potential operational impact. 

Isolate FortiSIEM Instances From the Internet

According to Fortinet’s documentation, FortiSIEM should be placed in an isolated network segment behind a firewall, and not exposed on the public internet. By keeping this service isolated from the internet, the attack surface is reduced and threat actors are prevented from gaining initial access through critical vulnerabilities such as CVE-2025-64155. 

Workaround (Optional) 

For users unable to immediately apply the patch, Fortinet recommends restricting network access to FortiSIEM’s phMonitor service (TCP/7900). 

References 

 

Share this post: