Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
HackTheBox 970x120 1
Fortinet FortiSIEM Vulnerability CVE-2025-64155: Critical Security Update

Fortinet FortiSIEM Vulnerability CVE-2025-64155: Critical Security Update

15 January 2026 07:18

A critical security flaw was recently patched by Fortinet through update releases, which significantly impacted FortiSIEM . An unauthenticated attacker could have exploited this weakness to execute arbitrary code on vulnerable instances.

The operating system has a security flaw, labeled CVE-2025-64155, which has a severity rating of 9.4 out of 10.0 on the CVS rating scale.

Specifically, the issue affects how FortiSIEM’s phMonitor service, a crucial backend process responsible for health monitoring, task dispatching, and inter-node communication over TCP port 7900, handles incoming requests for security event logging to Elasticsearch.

The limited file writing capability can be manipulated to gain full system control by injecting curl arguments that create a reverse shell in the “/opt/charting/redishb.sh” file. Since the file can be modified by a user with administrative privileges and executed every minute via a cron job running with root privileges, it lends itself to this exploit.

In other words, writing a reverse shell in this file allows escalation of privileges from administrator to root, granting the attacker unrestricted access to the FortiSIEM appliance. The most important aspect of the attack is that the phMonitor service exposes several command handlers that do not require authentication. This makes it easy for an attacker to access these functions simply by gaining network access to port 7900.

The discovery was made by Zach Hanley, a security researcher at Horizon3.ai, who is credited with discovering and reporting the flaw on August 14, 2025.

Fortinet said the vulnerability only affects Super and Worker nodes and has been fixed in the following releases:

  • FortiSIEM 6.7.0 through 6.7.10 (migrating to a fixed version)
  • FortiSIEM 7.0.0 through 7.0.4 (migrating to a fixed version)
  • FortiSIEM 7.1.0 to 7.1.8 (upgrade to 7.1.9 or later)
  • FortiSIEM 7.2.0 to 7.2.6 (upgrade to 7.2.7 or later)
  • FortiSIEM 7.3.0 to 7.3.4 (upgrade to 7.3.5 or later)
  • FortiSIEM 7.4.0 (Upgrade to 7.4.1 or later)
  • FortiSIEM 7.5 (not affected)
  • FortiSIEM Cloud (not affected)

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.