CVE-2025-54973
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-14

Last updated on: 2025-10-22

Assigner: Fortinet, Inc.

Description
A concurrent execution using shared resource with improper synchronization ('Race Condition') vulnerability [CWE-362] in Fortinet FortiAnalyzer version 7.6.0 through 7.6.2, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10 and before 7.0.13 allows an attacker to attempt to win a race condition to bypass the FortiCloud SSO authorization via crafted FortiCloud SSO requests.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-14
Last Modified
2025-10-22
Generated
2026-05-07
AI Q&A
2025-10-14
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
fortinet fortianalyzer From 7.0.9 (inc) to 7.0.14 (exc)
fortinet fortianalyzer From 7.2.0 (inc) to 7.2.11 (exc)
fortinet fortianalyzer From 7.4.0 (inc) to 7.4.7 (exc)
fortinet fortianalyzer From 7.6.0 (inc) to 7.6.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-362 The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a race condition in Fortinet FortiAnalyzer versions 7.6.0 through 7.6.2, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, and before 7.0.13. It occurs due to improper synchronization when multiple executions access a shared resource concurrently. An attacker can exploit this by sending specially crafted FortiCloud SSO requests to try to bypass the FortiCloud Single Sign-On (SSO) authorization.


How can this vulnerability impact me? :

The vulnerability allows an attacker to potentially bypass FortiCloud SSO authorization, which could lead to unauthorized access to systems or data protected by FortiCloud SSO. This could compromise the integrity of the system by allowing attackers to gain elevated access without proper authentication.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart