On July 8, 2025, Fortinet released PSIRT advisory FG-IR-25-026, detailing a heap-based buffer overflow vulnerability in the cw_stad daemon of FortiOS. While vulnerabilities always warrant attention, this particular issue is considered low priority for most organizations because it can only be exploited by an authenticated attacker and only under specific conditions.
Given that this vulnerability requires authenticated access, Logically is committed to maintaining the highest standards of security by ensuring that only trusted and authorized users have accounts on our managed devices.
If you are a Managed Service Customer with an active support agreement with Logically for your Fortinet appliance and are operating on an affected firmware version, please be assured that Logically enforces strict security best practices, including limiting administrative access to your appliances.
For clients not currently covered under a Logically Managed Firewall agreement but operating an affected device, we are still here to assist you. Please contact your Account Manager to arrange a comprehensive security review of your appliance. We can help you assess and implement best practices to mitigate vulnerabilities, with services available at our standard billable rates.
This vulnerability has a limited attack surface:
For most organizations, this vulnerability represents a low-priority concern. Nonetheless, it remains best practice to ensure that all devices are consistently updated to approved and supported firmware versions, alongside regular reviews of device configurations to maintain optimal security posture.
Even low-priority vulnerabilities are worth addressing as part of your regular maintenance cycle.
If you are operating a FortiOS device configured as a wireless client on an affected version, please ensure that access is strictly limited to authorized users. For most environments, however, this vulnerability poses minimal risk.