Arctic Wolf Security Bulletin
Arctic Wolf Security Bulletin

CVE-2025-25249: Remote Code Execution Vulnerability in FortiOS and FortiSwitchManager

On January 13, 2026, Fortinet released an advisory describing a high-severity remote code execution vulnerability affecting its FortiOS and FortiSwitchManager products.
Arctic Wolf Security Bulletin
6 min read

On January 13, 2026, Fortinet released an advisory describing a high-severity remote code execution vulnerability affecting its FortiOS and FortiSwitchManager products. According to Fortinet, the vulnerability stems from a flaw in the CAPWAP Wireless Aggregate Controller Daemon and could allow an unauthenticated, remote threat actor to execute arbitrary code or commands. The vulnerability was discovered internally by Fortinet’s Product Security Team. 

Fortinet recommends upgrading to the latest fixed version to address this vulnerability as soon as possible. For situations where near-term upgrade is not practical, they also provide a workaround to remove “fabric” access from each interface. 

Historically, threat actors have targeted Fortinet products to gain initial access. Although this recent FortiOS and FortiSwitchManager vulnerability is not known to be exploited in the wild and public proof-of-concept (PoC) exploit code is not available at this time, threat actors will likely attempt to leverage this flaw to access organizations’ networks in the future. 

Recommendations For CVE-2025-25249

Upgrade to Latest Fixed Version

Arctic Wolf strongly recommends that customers upgrade to the latest fixed version of affected Fortinet products. FortiOS runs on products such as FortiGate Next-Generation Firewalls, FortiGate VM, and FortiWiFi. 

For more details on the vulnerability and affected products, see the advisory page. 

Product  Affected Version  Fixed Version 
FortiOS 7.6  7.6.0 through 7.6.3  7.6.4 or above 
FortiOS 7.4  7.4.0 through 7.4.8  7.4.9 or above 
FortiOS 7.2  7.2.0 through 7.2.11  7.2.12 or above 
FortiOS 7.0  7.0.0 through 7.0.17  7.0.18 or above 
FortiOS 6.4  6.4.0 through 6.4.16  6.4.17 or above 
FortiSwitchManager 7.2  7.2.0 through 7.2.6  7.2.7 or above 
FortiSwitchManager 7.0  7.0.0 through 7.0.5  7.0.6 or above 
FortiSASE 25.1.a  25.1.a  Migrate to a fixed release 

 

Note: The following FortiSASE versions are unaffected: 22, 23.1, 23.2, 23.3, 24.4, 25.2. 

Workaround 

If immediate patching is not an option, Fortinet recommends removing “fabric” access or disallowing access to the CAPWAP daemon. Steps to do so can be found in their advisory. 

References 

Share this post: