Trusted hosts bypass via SSH

Summary

An Improper Privilege Management vulnerability [CWE-269] in FortiOS, FortiProxy and FortiPAM may allow an authenticated administrator to bypass the trusted host policy via crafted CLI command.

Version Affected Solution
FortiOS 7.6 7.6.0 through 7.6.3 Upgrade to 7.6.4 or above
FortiOS 7.4 7.4 all versions Migrate to a fixed release
FortiOS 7.2 7.2 all versions Migrate to a fixed release
FortiOS 7.0 7.0 all versions Migrate to a fixed release
FortiOS 6.4 6.4 all versions Migrate to a fixed release
FortiPAM 1.7 Not affected Not Applicable
FortiPAM 1.6 1.6.0 Upgrade to 1.6.1 or above
FortiPAM 1.5 1.5 all versions Migrate to a fixed release
FortiPAM 1.4 1.4 all versions Migrate to a fixed release
FortiPAM 1.3 1.3 all versions Migrate to a fixed release
FortiPAM 1.2 1.2 all versions Migrate to a fixed release
FortiPAM 1.1 1.1 all versions Migrate to a fixed release
FortiPAM 1.0 1.0 all versions Migrate to a fixed release
FortiProxy 7.6 7.6.0 through 7.6.3 Upgrade to 7.6.4 or above
FortiProxy 7.4 7.4 all versions Migrate to a fixed release
FortiProxy 7.2 7.2 all versions Migrate to a fixed release
FortiProxy 7.0 7.0 all versions Migrate to a fixed release
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

Acknowledgement

Fortinet is pleased to thank Nathan Jones from Orange Cyberdefense UK for reporting this vulnerability under responsible disclosure.

Timeline

2025-11-18: Initial publication