{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T09:20:40.992","vulnerabilities":[{"cve":{"id":"CVE-2025-68482","sourceIdentifier":"psirt@fortinet.com","published":"2026-03-10T18:17:59.903","lastModified":"2026-03-12T20:13:43.867","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A improper certificate validation vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4.0 through 7.4.8, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer 6.4 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4.0 through 7.4.8, FortiManager 7.2 all versions, FortiManager 7.0 all versions, FortiManager 6.4 all versions may allow a remote unauthenticated attacker to view confidential information via a man in the middle [MiTM] attack."},{"lang":"es","value":"Una vulnerabilidad de validación de certificado incorrecta en Fortinet FortiAnalyzer 7.6.0 hasta 7.6.4, FortiAnalyzer 7.4.0 hasta 7.4.8, FortiAnalyzer 7.2 todas las versiones, FortiAnalyzer 7.0 todas las versiones, FortiAnalyzer 6.4 todas las versiones, FortiManager 7.6.0 hasta 7.6.4, FortiManager 7.4.0 hasta 7.4.8, FortiManager 7.2 todas las versiones, FortiManager 7.0 todas las versiones, FortiManager 6.4 todas las versiones podría permitir a un atacante remoto no autenticado ver información confidencial a través de un ataque de intermediario [MitM]."}],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N","baseScore":6.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":4.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@fortinet.com","type":"Primary","description":[{"lang":"en","value":"CWE-295"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.0","versionEndExcluding":"7.4.9","matchCriteriaId":"BAA03593-75CE-49C0-9F26-9D7D8A60EAAD"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*","versionStartIncluding":"7.6.0","versionEndExcluding":"7.6.5","matchCriteriaId":"9F4A9AA3-C6AA-428B-AE1B-61F61658D642"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.0","versionEndExcluding":"7.4.9","matchCriteriaId":"C441B960-FD52-40BA-8FE1-16E3F2033554"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*","versionStartIncluding":"7.6.0","versionEndExcluding":"7.6.5","matchCriteriaId":"00645EEE-3E67-4B98-BB49-B23AD1D60B54"}]}]}],"references":[{"url":"https://fortiguard.fortinet.com/psirt/FG-IR-26-078","source":"psirt@fortinet.com","tags":["Vendor Advisory"]}]}}]}