An exposure of sensitive information to an unauthorized actor vulnerability in Fortinet FortiADC 7.4.0, FortiADC 7.2 all versions, FortiADC 7.1 all versions, FortiADC 7.0 all versions, FortiADC 6.2 all versions may allow an admin with read-only permission to get the external resources password via the logs of the product
References
| Link | Resource |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-25-686 | Vendor Advisory |
Configurations
History
20 Nov 2025, 14:33
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-532 | |
| First Time |
Fortinet
Fortinet fortiadc |
|
| References | () https://fortiguard.fortinet.com/psirt/FG-IR-25-686 - Vendor Advisory | |
| CPE | cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:* |
18 Nov 2025, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-18 17:16
Updated : 2025-11-20 14:33
NVD link : CVE-2025-54971
Mitre link : CVE-2025-54971
CVE.ORG link : CVE-2025-54971
JSON object : View
Products Affected
fortinet
- fortiadc
