Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47569: Information disclosure in Fortinet FortiVoice

0
Medium
VulnerabilityCVE-2024-47569cvecve-2024-47569
Published: Tue Oct 14 2025 (10/14/2025, 15:23:03 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiVoice

Description

A insertion of sensitive information into sent data in Fortinet FortiManager Cloud 7.4.1 through 7.4.3, FortiVoice 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.7 through 6.0.12, FortiMail 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.9, FortiOS 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, 6.2.0 through 6.2.17, 6.0.0 through 6.0.18, FortiWeb 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.11, 7.0.0 through 7.0.11, 6.4.0 through 6.4.3, FortiRecorder 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiNDR 7.6.0 through 7.6.1, 7.4.0 through 7.4.8, 7.2.0 through 7.2.5, 7.1.0 through 7.1.1, 7.0.0 through 7.0.7, 1.5.0 through 1.5.3, FortiPAM 1.3.0 through 1.3.1, 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiTester 7.4.0 through 7.4.2, 7.3.0 through 7.3.2, 7.2.0 through 7.2.3, 7.1.0 through 7.1.1, 7.0.0, 4.2.0 through 4.2.1, FortiProxy 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.21, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiManager 7.6.0 through 7.6.1, 7.4.1 through 7.4.3 allows attacker to disclose sensitive information via specially crafted packets.

AI-Powered Analysis

AILast updated: 10/21/2025, 16:49:28 UTC

Technical Analysis

CVE-2024-47569 is an information disclosure vulnerability identified in multiple Fortinet products, notably FortiVoice versions 6.0.7 through 7.0.4, FortiManager Cloud, FortiMail, FortiOS, FortiWeb, FortiRecorder, FortiNDR, FortiPAM, FortiTester, FortiProxy, and FortiManager. The vulnerability arises from improper handling of sensitive information during data transmission, where specially crafted packets can cause the insertion of sensitive data into sent packets, leading to unintended disclosure. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) and low privileges (PR:L), but no user interaction (UI:N). The scope remains unchanged (S:U), and the impact is limited to confidentiality (C:L) without affecting integrity or availability. The CVSS v3.1 base score is 4.2, indicating medium severity. The vulnerability was published on October 14, 2025, with no known exploits in the wild to date. The flaw affects a broad range of Fortinet products and versions, suggesting a systemic issue in how sensitive data is handled during communication processes within these devices. Attackers with network access and some level of authentication could exploit this to glean sensitive information, potentially aiding further attacks or espionage. The vulnerability's presence across critical Fortinet security and communication products increases the risk profile for organizations relying on these devices for network security and voice communications.

Potential Impact

For European organizations, the impact of CVE-2024-47569 centers on the potential unauthorized disclosure of sensitive information, which could include configuration details, credentials, or other confidential data transmitted by Fortinet devices. This exposure could facilitate further targeted attacks such as lateral movement, privilege escalation, or espionage. Given Fortinet's widespread deployment in European enterprises, government agencies, and critical infrastructure sectors, the vulnerability poses a risk to confidentiality and operational security. Although the vulnerability does not directly impact system integrity or availability, the leakage of sensitive data could undermine trust in network security and lead to regulatory compliance issues under GDPR and other data protection laws. The requirement for low privileges and network access means that internal threat actors or attackers who have breached perimeter defenses could exploit this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. Organizations in sectors such as finance, telecommunications, energy, and public administration are particularly at risk due to their reliance on Fortinet products for secure communications and network management.

Mitigation Recommendations

1. Apply official patches and updates from Fortinet as soon as they become available for all affected products and versions to remediate the vulnerability. 2. Restrict network access to management interfaces and Fortinet devices using network segmentation, firewalls, and access control lists to limit exposure to trusted administrators only. 3. Implement strict authentication and authorization policies to minimize the risk posed by low-privilege attackers. 4. Monitor network traffic for unusual or malformed packets that could indicate exploitation attempts, using intrusion detection/prevention systems tuned for Fortinet-specific signatures. 5. Conduct regular security audits and vulnerability assessments focusing on Fortinet devices to identify and remediate configuration weaknesses. 6. Educate network and security teams about this vulnerability and ensure incident response plans include steps for potential information disclosure events. 7. Where possible, use encrypted management channels (e.g., VPNs, TLS) to protect data in transit and reduce the risk of interception or manipulation. 8. Maintain an inventory of all Fortinet devices and their firmware versions to ensure timely patch management and vulnerability tracking.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2024-09-27T16:19:24.136Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee702b75ce224a0426b549

Added to database: 10/14/2025, 3:45:47 PM

Last enriched: 10/21/2025, 4:49:28 PM

Last updated: 12/3/2025, 12:42:59 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats