Threat actors are exploiting a serious authentication bypass vulnerability in FortiWeb, tracked as CVE-2025-52970, allowing unauthenticated attackers to log in as any user. Despite patches available in versions 8.0.2 and later, attacks have surged since a proof-of-concept was made public in August 2025. Security firms are reporting numerous compromises, underscoring the need for immediate patching.
WatchTowr Labs has developed an open-source tool to aid in detecting these vulnerabilities, which can create a temporary user if successful. Organizations are advised to scan their internet-facing appliances, apply relevant patches, and monitor for unusual logins as part of their defense strategy. With evolving supply chain attacks, tools like this are crucial in preventing WAFs from becoming entry points in the security landscape.
👉 Pročitaj original: Cyber Security News