Vulnerability Details CVE-2025-54971
An exposure of sensitive information to an unauthorized actor vulnerability in Fortinet FortiADC 7.4.0, FortiADC 7.2 all versions, FortiADC 7.1 all versions, FortiADC 7.0 all versions, FortiADC 6.2 all versions may allow an admin with read-only permission to get the external resources password via the logs of the product
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 4.4%
CVSS Severity
CVSS v3 Score 4.3
Products affected by CVE-2025-54971
-
cpe:2.3:a:fortinet:fortiadc:6.2.0
-
cpe:2.3:a:fortinet:fortiadc:6.2.1
-
cpe:2.3:a:fortinet:fortiadc:6.2.2
-
cpe:2.3:a:fortinet:fortiadc:6.2.3
-
cpe:2.3:a:fortinet:fortiadc:6.2.4
-
cpe:2.3:a:fortinet:fortiadc:6.2.5
-
cpe:2.3:a:fortinet:fortiadc:6.2.6
-
cpe:2.3:a:fortinet:fortiadc:7.0.0
-
cpe:2.3:a:fortinet:fortiadc:7.0.1
-
cpe:2.3:a:fortinet:fortiadc:7.0.2
-
cpe:2.3:a:fortinet:fortiadc:7.0.3
-
cpe:2.3:a:fortinet:fortiadc:7.0.4
-
cpe:2.3:a:fortinet:fortiadc:7.0.5
-
cpe:2.3:a:fortinet:fortiadc:7.1.0
-
cpe:2.3:a:fortinet:fortiadc:7.1.1
-
cpe:2.3:a:fortinet:fortiadc:7.1.2
-
cpe:2.3:a:fortinet:fortiadc:7.1.3
-
cpe:2.3:a:fortinet:fortiadc:7.1.4
-
cpe:2.3:a:fortinet:fortiadc:7.1.5
-
cpe:2.3:a:fortinet:fortiadc:7.2.0
-
cpe:2.3:a:fortinet:fortiadc:7.2.1
-
cpe:2.3:a:fortinet:fortiadc:7.2.2
-
cpe:2.3:a:fortinet:fortiadc:7.2.3
-
cpe:2.3:a:fortinet:fortiadc:7.2.4
-
cpe:2.3:a:fortinet:fortiadc:7.2.5
-
cpe:2.3:a:fortinet:fortiadc:7.2.6
-
cpe:2.3:a:fortinet:fortiadc:7.2.7
-
cpe:2.3:a:fortinet:fortiadc:7.2.8
-
cpe:2.3:a:fortinet:fortiadc:7.4.0
-
cpe:2.3:a:fortinet:fortiadc:7.4.1
-
cpe:2.3:a:fortinet:fortiadc:7.4.2