CVE Vulnerabilities

CVE-2025-68648

Use of Externally-Controlled Format String

Published: Mar 10, 2026 | Modified: Mar 13, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

A use of externally-controlled format string vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4.0 through 7.4.7, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer Cloud 7.6.0 through 7.6.4, FortiAnalyzer Cloud 7.4.0 through 7.4.7, FortiAnalyzer Cloud 7.2 all versions, FortiAnalyzer Cloud 7.0 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4.0 through 7.4.7, FortiManager 7.2 all versions, FortiManager 7.0 all versions, FortiManager Cloud 7.6.0 through 7.6.4, FortiManager Cloud 7.4.0 through 7.4.7, FortiManager Cloud 7.2 all versions, FortiManager Cloud 7.0 all versions may allow an attacker to escalate its privileges via specially crafted requests.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
FortianalyzerFortinet7.0.0 (including)7.4.8 (excluding)
FortianalyzerFortinet7.6.0 (including)7.6.5 (excluding)
Fortianalyzer_cloudFortinet7.0.0 (including)7.4.8 (excluding)
Fortianalyzer_cloudFortinet7.6.0 (including)7.6.5 (excluding)
FortimanagerFortinet7.0.0 (including)7.4.8 (excluding)
FortimanagerFortinet7.6.0 (including)7.6.5 (excluding)
Fortimanager_cloudFortinet7.0.0 (including)7.4.8 (excluding)
Fortimanager_cloudFortinet7.6.0 (including)7.6.5 (excluding)

Potential Mitigations

References