CVE-2024-47569: Information disclosure in Fortinet FortiVoice
A insertion of sensitive information into sent data in Fortinet FortiManager Cloud 7.4.1 through 7.4.3, FortiVoice 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.7 through 6.0.12, FortiMail 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.9, FortiOS 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, 6.2.0 through 6.2.17, 6.0.0 through 6.0.18, FortiWeb 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.11, 7.0.0 through 7.0.11, 6.4.0 through 6.4.3, FortiRecorder 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiNDR 7.6.0 through 7.6.1, 7.4.0 through 7.4.8, 7.2.0 through 7.2.5, 7.1.0 through 7.1.1, 7.0.0 through 7.0.7, 1.5.0 through 1.5.3, FortiPAM 1.3.0 through 1.3.1, 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiTester 7.4.0 through 7.4.2, 7.3.0 through 7.3.2, 7.2.0 through 7.2.3, 7.1.0 through 7.1.1, 7.0.0, 4.2.0 through 4.2.1, FortiProxy 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.21, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiManager 7.6.0 through 7.6.1, 7.4.1 through 7.4.3 allows attacker to disclose sensitive information via specially crafted packets.
AI Analysis
Technical Summary
CVE-2024-47569 is an information disclosure vulnerability identified in multiple Fortinet products, notably FortiVoice versions 6.0.7 through 7.0.4, FortiManager Cloud, FortiMail, FortiOS, FortiWeb, FortiRecorder, FortiNDR, FortiPAM, FortiTester, FortiProxy, and FortiManager. The vulnerability arises from improper handling of sensitive information during data transmission, where specially crafted packets can cause the insertion of sensitive data into sent packets, leading to unintended disclosure. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact is limited to confidentiality (C:L) without affecting integrity or availability. The CVSS v3.1 base score is 4.2, indicating medium severity. The vulnerability was published on October 14, 2025, with no known exploits in the wild to date. The flaw affects a broad range of Fortinet products and versions, suggesting a systemic issue in how sensitive data is handled during communication processes within these devices. Attackers with network access and some level of authentication could exploit this to glean sensitive information, potentially aiding further attacks or espionage. The vulnerability's presence across critical Fortinet security and communication products increases the risk profile for organizations relying on these devices for network security and voice communications.
Potential Impact
For European organizations, the impact of CVE-2024-47569 centers on the potential unauthorized disclosure of sensitive information, which could include configuration details, credentials, or other confidential data transmitted by Fortinet devices. This exposure could facilitate further targeted attacks such as lateral movement, privilege escalation, or espionage. Given Fortinet's widespread deployment in European enterprises, government agencies, and critical infrastructure sectors, the vulnerability poses a risk to confidentiality and operational security. Although the vulnerability does not directly impact system integrity or availability, the leakage of sensitive data could undermine trust in network security and lead to regulatory compliance issues under GDPR and other data protection laws. The requirement for low privileges and network access means that internal threat actors or attackers who have breached perimeter defenses could exploit this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. Organizations in sectors such as finance, telecommunications, energy, and public administration are particularly at risk due to their reliance on Fortinet products for secure communications and network management.
Mitigation Recommendations
1. Apply official patches and updates from Fortinet as soon as they become available for all affected products and versions to remediate the vulnerability. 2. Restrict network access to management interfaces and Fortinet devices using network segmentation, firewalls, and access control lists to limit exposure to trusted administrators only. 3. Implement strict authentication and authorization policies to minimize the risk posed by low-privilege attackers. 4. Monitor network traffic for unusual or malformed packets that could indicate exploitation attempts, using intrusion detection/prevention systems tuned for Fortinet-specific signatures. 5. Conduct regular security audits and vulnerability assessments focusing on Fortinet devices to identify and remediate configuration weaknesses. 6. Educate network and security teams about this vulnerability and ensure incident response plans include steps for potential information disclosure events. 7. Where possible, use encrypted management channels (e.g., VPNs, TLS) to protect data in transit and reduce the risk of interception or manipulation. 8. Maintain an inventory of all Fortinet devices and their firmware versions to ensure timely patch management and vulnerability tracking.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Switzerland
CVE-2024-47569: Information disclosure in Fortinet FortiVoice
Description
A insertion of sensitive information into sent data in Fortinet FortiManager Cloud 7.4.1 through 7.4.3, FortiVoice 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.7 through 6.0.12, FortiMail 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.9, FortiOS 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, 6.2.0 through 6.2.17, 6.0.0 through 6.0.18, FortiWeb 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.11, 7.0.0 through 7.0.11, 6.4.0 through 6.4.3, FortiRecorder 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiNDR 7.6.0 through 7.6.1, 7.4.0 through 7.4.8, 7.2.0 through 7.2.5, 7.1.0 through 7.1.1, 7.0.0 through 7.0.7, 1.5.0 through 1.5.3, FortiPAM 1.3.0 through 1.3.1, 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiTester 7.4.0 through 7.4.2, 7.3.0 through 7.3.2, 7.2.0 through 7.2.3, 7.1.0 through 7.1.1, 7.0.0, 4.2.0 through 4.2.1, FortiProxy 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.21, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiManager 7.6.0 through 7.6.1, 7.4.1 through 7.4.3 allows attacker to disclose sensitive information via specially crafted packets.
AI-Powered Analysis
Technical Analysis
CVE-2024-47569 is an information disclosure vulnerability identified in multiple Fortinet products, notably FortiVoice versions 6.0.7 through 7.0.4, FortiManager Cloud, FortiMail, FortiOS, FortiWeb, FortiRecorder, FortiNDR, FortiPAM, FortiTester, FortiProxy, and FortiManager. The vulnerability arises from improper handling of sensitive information during data transmission, where specially crafted packets can cause the insertion of sensitive data into sent packets, leading to unintended disclosure. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact is limited to confidentiality (C:L) without affecting integrity or availability. The CVSS v3.1 base score is 4.2, indicating medium severity. The vulnerability was published on October 14, 2025, with no known exploits in the wild to date. The flaw affects a broad range of Fortinet products and versions, suggesting a systemic issue in how sensitive data is handled during communication processes within these devices. Attackers with network access and some level of authentication could exploit this to glean sensitive information, potentially aiding further attacks or espionage. The vulnerability's presence across critical Fortinet security and communication products increases the risk profile for organizations relying on these devices for network security and voice communications.
Potential Impact
For European organizations, the impact of CVE-2024-47569 centers on the potential unauthorized disclosure of sensitive information, which could include configuration details, credentials, or other confidential data transmitted by Fortinet devices. This exposure could facilitate further targeted attacks such as lateral movement, privilege escalation, or espionage. Given Fortinet's widespread deployment in European enterprises, government agencies, and critical infrastructure sectors, the vulnerability poses a risk to confidentiality and operational security. Although the vulnerability does not directly impact system integrity or availability, the leakage of sensitive data could undermine trust in network security and lead to regulatory compliance issues under GDPR and other data protection laws. The requirement for low privileges and network access means that internal threat actors or attackers who have breached perimeter defenses could exploit this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. Organizations in sectors such as finance, telecommunications, energy, and public administration are particularly at risk due to their reliance on Fortinet products for secure communications and network management.
Mitigation Recommendations
1. Apply official patches and updates from Fortinet as soon as they become available for all affected products and versions to remediate the vulnerability. 2. Restrict network access to management interfaces and Fortinet devices using network segmentation, firewalls, and access control lists to limit exposure to trusted administrators only. 3. Implement strict authentication and authorization policies to minimize the risk posed by low-privilege attackers. 4. Monitor network traffic for unusual or malformed packets that could indicate exploitation attempts, using intrusion detection/prevention systems tuned for Fortinet-specific signatures. 5. Conduct regular security audits and vulnerability assessments focusing on Fortinet devices to identify and remediate configuration weaknesses. 6. Educate network and security teams about this vulnerability and ensure incident response plans include steps for potential information disclosure events. 7. Where possible, use encrypted management channels (e.g., VPNs, TLS) to protect data in transit and reduce the risk of interception or manipulation. 8. Maintain an inventory of all Fortinet devices and their firmware versions to ensure timely patch management and vulnerability tracking.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- fortinet
- Date Reserved
- 2024-09-27T16:19:24.136Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee702b75ce224a0426b549
Added to database: 10/14/2025, 3:45:47 PM
Last enriched: 10/21/2025, 4:49:28 PM
Last updated: 12/3/2025, 12:42:59 PM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13342: CWE-862 Missing Authorization in shabti Frontend Admin by DynamiApps
CriticalCVE-2025-13109: CWE-639 Authorization Bypass Through User-Controlled Key in realmag777 HUSKY – Products Filter Professional for WooCommerce
MediumCVE-2025-12887: CWE-862 Missing Authorization in saadiqbal Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App
MediumCVE-2025-12358: CWE-352 Cross-Site Request Forgery (CSRF) in roxnor ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution
MediumArizona Attorney General Sues Chinese Online Retailer Temu Over Data Theft Claims
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.