CVE-2019-6693

Fortinet · Fortinet FortiOS

A critical vulnerability exists within Fortinet FortiOS due to the use of hard-coded credentials embedded in the software.

Executive summary

A critical vulnerability exists within Fortinet FortiOS due to the use of hard-coded credentials embedded in the software. This flaw allows an unauthenticated attacker to gain administrative access to affected network security appliances, potentially leading to a complete compromise of the network's security posture, data interception, and unauthorized access to internal systems. Given its active exploitation in the wild and inclusion in the CISA KEV catalog, this vulnerability represents an immediate and severe threat.

Vulnerability

This vulnerability stems from a hard-coded, or fixed, credential pair (username and password) embedded directly within the FortiOS firmware. An attacker with network access to an affected device's management interface (such as SSH or the web-based GUI) can use this static credential to authenticate with high-level privileges. Exploitation is simple and requires no user interaction or special conditions beyond knowledge of the credential and access to the login portal, allowing a remote attacker to bypass standard authentication mechanisms and gain control over the device.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.5. A successful exploit would grant an attacker administrative control over the Fortinet security appliance, which acts as the gateway and security enforcer for the network. This could lead to catastrophic consequences, including the ability to monitor, modify, or block all network traffic, disable firewall policies, establish a persistent foothold for pivoting into the corporate network, exfiltrate sensitive data, and deploy ransomware. The direct compromise of a core network security device poses a severe risk to business operations, data confidentiality, and organizational reputation.

Remediation

Immediate Action: The immediate and required action is to apply vendor-supplied patches or mitigations before the FEDERAL DEADLINE: July 15, 2025 (5 days). Per CISA's directive, organizations must apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Due to the critical nature and active exploitation, this should be treated as an emergency change.

Proactive Monitoring: Security teams should immediately begin monitoring for signs of compromise. Review authentication logs on all FortiOS devices for any successful logins from unknown IP addresses or logins occurring outside of normal business hours. Scrutinize system logs for unexplained configuration changes, the creation of new user accounts, or modifications to firewall rules. Monitor network traffic for any unusual outbound connections originating from the FortiOS device itself.

Compensating Controls: If patching cannot be performed immediately, implement compensating controls as a temporary measure. Strictly limit access to the FortiOS management interface (HTTPS, SSH) to a dedicated, secure management network or a small set of trusted IP addresses. If possible, enforce multi-factor authentication (MFA) on all administrative accounts, although this may not protect the specific hard-coded account.

Exploitation status

Public Exploit Available: True

Analyst recommendation

Given the critical CVSS score of 9.5, confirmed active exploitation in the wild, and the urgent CISA KEV deadline of July 15, 2025, this vulnerability must be addressed immediately. We recommend that all teams responsible for network infrastructure treat this as a top-priority, emergency directive. All affected Fortinet FortiOS appliances must be identified and patched or otherwise mitigated before the deadline without exception. Following remediation, a thorough audit of device logs and configurations should be conducted to search for any indicators of prior compromise.