{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-64155","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","dateReserved":"2025-10-28T12:26:50.750Z","datePublished":"2026-01-13T16:32:28.665Z","dateUpdated":"2026-02-26T15:04:42.772Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiSIEM","cpes":["cpe:2.3:a:fortinet:fortisiem:7.4.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisiem:7.3.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisiem:7.3.3:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisiem:7.3.2:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisiem:7.3.1:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisiem:7.3.0:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisiem:7.2.6:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisiem:7.1.8:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisiem:7.0.4:*:*:*:*:*:*:*","cpe:2.3:a:fortinet:fortisiem:6.7.10:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"7.4.0","status":"affected"},{"versionType":"semver","version":"7.3.0","lessThanOrEqual":"7.3.4","status":"affected"},{"version":"7.2.6","status":"affected"},{"version":"7.1.8","status":"affected"},{"version":"7.0.4","status":"affected"},{"version":"6.7.10","status":"affected"}]}],"descriptions":[{"lang":"en","value":"An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4, FortiSIEM 7.1.0 through 7.1.8, FortiSIEM 7.0.0 through 7.0.4, FortiSIEM 6.7.0 through 6.7.10 may allow an attacker to execute unauthorized code or commands via  crafted TCP requests."}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2026-01-14T09:16:05.278Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-78","description":"Execute unauthorized code or commands","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.4,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C"}}],"solutions":[{"lang":"en","value":"Upgrade to FortiSIEM version 7.5.0 or above\nUpgrade to FortiSIEM version 7.4.1 or above\nUpgrade to FortiSIEM version 7.3.5 or above\nUpgrade to FortiSIEM version 7.2.7 or above\nUpgrade to FortiSIEM version 7.1.9 or above"}],"references":[{"name":"https://fortiguard.fortinet.com/psirt/FG-IR-25-772","url":"https://fortiguard.fortinet.com/psirt/FG-IR-25-772"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-64155","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2026-01-14T04:57:28.543992Z"}}}],"references":[{"url":"https://github.com/horizon3ai/CVE-2025-64155","tags":["exploit"]},{"url":"https://github.com/purehate/CVE-2025-64155-hunter","tags":["exploit"]}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T15:04:42.772Z"}}]}}