Home Fortinet CVE-2025-54658
Back to Fortinet

CVE-2025-54658

FortiDLP Agent - Outlookproxy plugin

Fortinet CVSS 7.8 Updated March 16, 2026

Executive Risk Summary

"A Path Traversal vulnerability in Fortinet FortiDLP Agent's Outlookproxy plugin for MacOS may allow an authenticated attacker to escalate their privilege to Root via sending a crafted request to a local listening port. This vulnerability affects multiple versions of MacOS, including 11.5.1, 11.4.2 through 11.4.6, and others."

Operational Audit Arsenal

Target Type plugin
Target Asset Outlookproxy
Standard Path Global Firmware

Manual Verification Required

This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.

Patch Impact Forecast

Reboot Required Likely

Moderate

Internal Work Notes

FortiDLP Agent vulnerability allows privilege escalation to Root, patching required to prevent potential security breaches

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Scope of Impact

Fortinet Fortidlp AgentApple Macos

Original NVD Description

"An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in Fortinet FortiDLP Agent's Outlookproxy plugin for MacOS 11.5.1 and 11.4.2 through 11.4.6 and 11.3.2 through 11.3.4 and 11.2.0 through 11.2.3 and 11.1.1 through 11.1.2 and 11.0.1 and 10.5.1 and 10.4.0, and 10.3.1 may allow an authenticated attacker to escalate their privilege to Root via sending a crafted request to a local listening port."

Related Fortinet Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.