Rewterz
Microsoft .NET Zero-Day Enables DoS Attacks
March 11, 2026
Rewterz
SideWinder APT Group aka Rattlesnake Targeting Pakistan – Active IOCs
March 11, 2026

FortiManager Vulnerability Enables Malicious Commands

Severity

High

Analysis Summary

Fortinet has disclosed a high-severity stack-based buffer overflow vulnerability in its FortiManager platform, tracked as CVE-2025-54820, with a CVSSv3 score of high. This flaw affects multiple on-premises FortiManager versions and could allow remote, unauthenticated attackers to execute unauthorized commands. The vulnerability resides specifically in the fgtupdates service, which must be actively enabled for exploitation, making the attack conditional. Successful exploitation also requires bypassing existing stack protection mechanisms, which increases attack complexity and explains the High rather than Critical severity rating.

Affected versions include FortiManager 7.4 (builds 7.4.0 through 7.4.2), 7.2 (builds 7.2.0 through 7.2.10), and all releases of 6.4. FortiManager Cloud deployments are not affected, limiting exposure to on-premises environments. Fortinet recommends upgrading to patched versions 7.4.3 or above for 7.4, 7.2.11 or above for 7.2, and a fixed release for 6.4 to fully mitigate the risk.

For organizations unable to apply immediate patches, Fortinet advises temporarily disabling the fgtupdates service. Administrators can remove the service from the access list on relevant interfaces using CLI commands, ensuring it is not listed among enabled services on any exposed interface. While this workaround reduces immediate risk, upgrading to patched versions remains the most effective remediation.

FortiManager is widely used in enterprise and government environments to centrally manage Fortinet security devices. As network management platforms become attractive targets for threat actors seeking lateral movement and persistent access, this vulnerability represents a significant risk. Security teams should audit active FortiManager services, apply patches promptly, and monitor for anomalous activity related to the fgtupdates endpoint to prevent potential exploitation.

Impact

  • Buffer Overflow
  • Gain Access

Indicators of Compromise

CVE

  • CVE-2025-54820

Remediation

  • Upgrade FortiManager to patched versions.
  • Temporarily disable the fgtupdates service (if patching is not immediately possible).
  • Remove fgtupdates from service access lists on exposed interfaces using CLI.
  • Audit FortiManager services to ensure fgtupdates is not enabled unnecessarily.
  • Monitor network activity for anomalous access attempts to the fgtupdates endpoint.
  • Limit exposure by ensuring FortiManager interfaces running fgtupdates are not publicly accessible.