An Exposure of Sensitive Information to an Unauthorized Actor vulnerability [CWE-200] vulnerability in Fortinet FortiOS 7.6.0 through 7.6.1, FortiOS 7.4.0 through 7.4.6, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions may allow a remote unauthenticated attacker to bypass the patch developed for the symbolic link persistency mechanism observed in some post-exploit cases, via crafted HTTP requests. An attacker would need first to have compromised the product via another vulnerability, at filesystem level.
References
| Link | Resource |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-25-934 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
12 Feb 2026, 14:49
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://fortiguard.fortinet.com/psirt/FG-IR-25-934 - Vendor Advisory | |
| First Time |
Fortinet
Fortinet fortios |
|
| CPE | cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
10 Feb 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-10 16:16
Updated : 2026-02-12 14:49
NVD link : CVE-2025-68686
Mitre link : CVE-2025-68686
CVE.ORG link : CVE-2025-68686
JSON object : View
Products Affected
fortinet
- fortios
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
