Fortinet fixes critical FortiSIEM OS command injection flaw.

Critical unauthenticated FortiSIEM OS command‑injection (CVE‑2025‑64155) via phMonitor on port 7900 allows arbitrary file writes and root takeover—apply patches and restrict port 7900; FortiFone fix (CVE‑2025‑47855) also released

  • Fortinet patched a critical OS command injection in FortiSIEM (CVE-2025-64155, CVSS 9.4) that can be exploited without authentication.
  • The flaw targets the phMonitor service on TCP port 7900 and enables arbitrary file writes as the admin user, then escalation to root via a cron-executed file.
  • Researcher Zach Hanley of Horizon3.ai detailed a two-stage exploit: argument injection to write files and a file-overwrite escalation to root.
  • Fortinet also released fixes for a separate critical FortiFone issue (CVE-2025-47855, CVSS 9.3); users should apply updates and restrict access to port 7900 as a workaround.

On Jan 14, 2026, Fortinet published updates to fix a critical vulnerability in FortiSIEM that could allow unauthenticated attackers to execute code on vulnerable appliances, affecting Super and Worker nodes, and rated 9.4. The company detailed the issue and available fixes in its security bulletin (see Fortinet bulletin).

- Advertisement -

"An improper neutralization of special elements used in an OS command (‘OS command injection’) vulnerability [CWE-78] in FortiSIEM may allow an unauthenticated attacker to execute unauthorized code or commands via crafted TCP requests," the company stated in that bulletin.

Security researcher Zach Hanley of Horizon3.ai reported the flaw and described it as two moving parts: an unauthenticated argument-injection that permits arbitrary file writes as the admin user, and a subsequent file overwrite that escalates privileges to root, fully compromising the appliance (see Horizon3.ai disclosure).

The vulnerability stems from how FortiSIEM‘s phMonitor service handles TCP requests on port 7900, invoking a shell script with user-controlled parameters and enabling argument injection via curl. Fortinet documentation describes phMonitor as responsible for health monitoring, task distribution, and inter-node communication (see documentation).

An attacker can write a reverse shell to "/opt/charting/redishb.sh" as the admin user; that file is executed every minute by a cron job running as root, enabling full system takeover if reachable via port 7900. Fortinet listed fixed and unaffected FortiSIEM releases and advised customers to migrate or upgrade to the patched versions in its bulletin.

- Advertisement -

Fortinet also issued patches for a critical FortiFone vulnerability (CVE-2025-47855, CVSS 9.3) that could expose device configuration via crafted HTTP(S) requests (details and fixes listed in Fortinet bulletin). Users are advised to update affected systems and, as a temporary mitigation for CVE-2025-64155, limit network access to port 7900.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Cathie Wood: US Bitcoin Purchases Could Ignite Scarcity Now!

Cathie Wood, CEO of Ark Invest, said the U.S. buying Bitcoin could speed up...

Cathie Wood: Gold Surges Bitcoin Weakened – Different Roles

Cathie Wood says the split between Gold and Bitcoin reflects different roles and timing,...

Anthropic ClaudeAI CoWork Enables AI Vibe Audits for Crypto!

Anthropic updated its AI coding tool to give developers full desktop access through the...

Publishers Sue to Block Google Over Pirated Books in AI Case

Hachette Book Group and Cengage Group moved to join a California federal class action...

Radix launches public Hyperscale test targeting 500k TPS now

Radix Foundation announced its 2026 Strategy, shifting toward a fully decentralized ecosystem and ending...
- Advertisement -

Must Read

9 Best Books On Ethereum And Blockchain Technology

QUICK LINKSHow to Choose Your First Blockchain Book: A Simple Framework1. Define Your Goal: Are you looking to Build, Invest, or Understand?2. Assess Your...
Bitcoin (BTC) $ 95,348.00 1.58%
Ethereum (ETH) $ 3,305.10 1.57%
XRP (XRP) $ 2.06 2.44%
Bittensor (TAO) $ 273.03 4.43%
Polkadot (DOT) $ 2.12 4.17%
Cardano (ADA) $ 0.391052 3.80%
Chainlink (LINK) $ 13.73 2.05%
Hyperliquid (HYPE) $ 24.95 1.04%
Monero (XMR) $ 706.16 2.87%
Hedera (HBAR) $ 0.116723 3.86%
Toncoin (TON) $ 1.70 3.93%