Critical FortiSwitch flaw lets hackers change admin passwords remotely – BleepingComputer


Published on: 2025-04-09

Intelligence Report: Critical FortiSwitch Flaw Lets Hackers Change Admin Passwords Remotely – BleepingComputer

1. BLUF (Bottom Line Up Front)

A critical vulnerability in FortiSwitch devices allows unauthenticated attackers to change administrator passwords remotely. This flaw, identified as CVE, poses significant security risks due to its low complexity and lack of user interaction requirements. Fortinet has released a security patch to address the issue, but exposed instances remain online. Immediate action is recommended to apply patches and restrict access to vulnerable devices.

2. Detailed Analysis

The following structured analytic techniques have been applied for this analysis:

General Analysis

The vulnerability was discovered by the FortiSwitch web UI development team and allows remote password changes via specially crafted requests. The flaw affects multiple versions of FortiSwitch, with potential exposure of devices online as reported by Censys. The vulnerability’s exploitation does not require user interaction, increasing the risk of unauthorized access and potential data breaches.

3. Implications and Strategic Risks

The exploitation of this vulnerability could lead to unauthorized access to critical network infrastructure, posing risks to national security and economic interests. The potential for widespread exploitation by threat actors, including state-sponsored groups, could destabilize regional security and disrupt business operations. The vulnerability’s presence in multiple Fortinet products further amplifies the risk landscape.

4. Recommendations and Outlook

Recommendations:

  • Immediately apply the security patch released by Fortinet to affected FortiSwitch devices.
  • Implement temporary workarounds by disabling administrative interface access and restricting device access to trusted hosts.
  • Conduct regular security audits and vulnerability assessments to identify and mitigate potential risks.
  • Enhance monitoring and incident response capabilities to detect and respond to unauthorized access attempts.

Outlook:

In the best-case scenario, rapid patch deployment and access restrictions will mitigate the vulnerability’s impact. In the worst-case scenario, failure to address the flaw could lead to widespread exploitation and significant data breaches. The most likely outcome involves a combination of patch application and increased security measures, reducing but not eliminating the risk.

5. Key Individuals and Entities

The report mentions Daniel Rozeboom and the FortiSwitch web UI development team as significant contributors to the discovery and resolution of the vulnerability. Additionally, Censys is highlighted for identifying exposed instances online.

Critical FortiSwitch flaw lets hackers change admin passwords remotely - BleepingComputer - Image 1

Critical FortiSwitch flaw lets hackers change admin passwords remotely - BleepingComputer - Image 2

Critical FortiSwitch flaw lets hackers change admin passwords remotely - BleepingComputer - Image 3

Critical FortiSwitch flaw lets hackers change admin passwords remotely - BleepingComputer - Image 4