An exposure of sensitive information to an unauthorized actor vulnerability in Fortinet FortiADC 7.4.0, FortiADC 7.2 all versions, FortiADC 7.1 all versions, FortiADC 7.0 all versions, FortiADC 6.2 all versions may allow an admin with read-only permission to get the external resources password via the logs of the product
Advisories

No advisories yet.

Fixes

Solution

Upgrade to FortiADC version 7.6.0 or above Upgrade to FortiADC version 7.4.3 or above


Workaround

No workaround given by the vendor.

History

Tue, 18 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Description An exposure of sensitive information to an unauthorized actor vulnerability in Fortinet FortiADC 7.4.0, FortiADC 7.2 all versions, FortiADC 7.1 all versions, FortiADC 7.0 all versions, FortiADC 6.2 all versions may allow an admin with read-only permission to get the external resources password via the logs of the product
First Time appeared Fortinet
Fortinet fortiadc
Weaknesses CWE-200
CPEs cpe:2.3:h:fortinet:fortiadc:6.2.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.7:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.8:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.4.0:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortiadc
References
Metrics cvssV3_1

{'score': 3.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2025-11-18T17:01:17.182Z

Reserved: 2025-08-04T08:14:35.421Z

Link: CVE-2025-54971

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-18T17:16:03.680

Modified: 2025-11-18T17:16:03.680

Link: CVE-2025-54971

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.