Zero-day vulnerability in FortiOS

Information disclosure
CVE-2025-68686

Vulnerability details

Advisory: SB2026021047 - SSL-VPN symlink persistence patch bypass in FortiOS

Vulnerable component: FortiOS

CVE-ID: CVE-2025-68686

CVSSv3 score: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C

CWE-ID: CWE-200 - Exposure of sensitive information to an unauthorized actor

Description:

The vulnerability allows a remote user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by FortiOS SSL-VPN. A remote user can send a specially crafted HTTP request to bypass the patch developed for the symbolic link persistency mechanism and gain unauthorized access to sensitive information.

Note, the vulnerability is being exploited in the wild in conjunction with other vulnerabilities that provide access at filesystem level.

External links:

https://www.fortiguard.com/psirt/FG-IR-25-934

https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity