CVE-2024-47569: Information disclosure in Fortinet FortiVoice
A insertion of sensitive information into sent data in Fortinet FortiManager Cloud 7.4.1 through 7.4.3, FortiVoice 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.7 through 6.0.12, FortiMail 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.9, FortiOS 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, 6.2.0 through 6.2.17, 6.0.0 through 6.0.18, FortiWeb 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.11, 7.0.0 through 7.0.11, 6.4.0 through 6.4.3, FortiRecorder 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiNDR 7.6.0 through 7.6.1, 7.4.0 through 7.4.8, 7.2.0 through 7.2.5, 7.1.0 through 7.1.1, 7.0.0 through 7.0.7, 1.5.0 through 1.5.3, FortiPAM 1.3.0 through 1.3.1, 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiTester 7.4.0 through 7.4.2, 7.3.0 through 7.3.2, 7.2.0 through 7.2.3, 7.1.0 through 7.1.1, 7.0.0, 4.2.0 through 4.2.1, FortiProxy 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.21, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiManager 7.6.0 through 7.6.1, 7.4.1 through 7.4.3 allows attacker to disclose sensitive information via specially crafted packets.
AI Analysis
Technical Summary
CVE-2024-47569 is an information disclosure vulnerability identified in multiple Fortinet products, notably FortiVoice versions 6.0.7 through 7.0.4, as well as FortiManager Cloud, FortiMail, FortiOS, FortiWeb, FortiRecorder, FortiNDR, FortiPAM, FortiTester, FortiProxy, and FortiManager across various versions. The vulnerability arises from improper handling of data packets, where specially crafted packets sent by an attacker can cause sensitive information to be inserted into outgoing data streams. This flaw allows an attacker with network-level access and low privileges (PR:L) to extract confidential information without requiring user interaction or causing disruption to system integrity or availability. The CVSS 3.1 base score is 4.2 (medium), reflecting the limited scope and impact. The vulnerability affects a broad range of Fortinet products used for voice communications, email security, web application security, network detection and response, privileged access management, and proxy services. The flaw could expose sensitive configuration data, credentials, or other confidential information that may facilitate further attacks if leveraged. No known exploits are currently reported in the wild, but the complexity of exploitation is low given network access and no user interaction needed. The vulnerability was publicly disclosed on October 14, 2025, and remains unpatched in some versions, emphasizing the need for immediate attention by affected organizations.
Potential Impact
For European organizations, the information disclosure vulnerability poses a risk of leaking sensitive data such as configuration details, credentials, or internal communications, which could be leveraged by threat actors for lateral movement, espionage, or targeted attacks. Organizations relying on Fortinet FortiVoice and related products for critical communications, email security, or network defense could see confidentiality compromised, potentially affecting business operations, regulatory compliance (e.g., GDPR), and customer trust. While the vulnerability does not impact integrity or availability directly, the exposure of sensitive information can facilitate more severe attacks. Given the widespread use of Fortinet products across European enterprises, telecom providers, and government agencies, the risk is significant especially where network segmentation or access controls are weak. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once details are public. The medium severity rating suggests prioritizing remediation but not immediate emergency response unless combined with other vulnerabilities or active exploitation.
Mitigation Recommendations
1. Apply official patches and updates from Fortinet as soon as they become available for all affected products and versions. 2. Restrict network access to management interfaces and Fortinet devices to trusted internal networks and VPNs only, minimizing exposure to untrusted networks. 3. Implement strict network segmentation to isolate Fortinet devices from general user traffic and external access. 4. Monitor network traffic for unusual or malformed packets targeting Fortinet devices, which may indicate exploitation attempts. 5. Conduct regular audits of Fortinet device configurations and logs to detect unauthorized access or data leakage. 6. Employ multi-factor authentication and least privilege principles for accounts with access to Fortinet management interfaces. 7. Engage with Fortinet support and threat intelligence sources to stay informed about emerging exploits or additional mitigation guidance. 8. Consider deploying intrusion detection/prevention systems tuned to detect attempts to exploit this vulnerability. 9. Educate security teams about the vulnerability specifics to improve incident response readiness. 10. For critical environments, consider temporary compensating controls such as disabling vulnerable services or isolating affected devices until patches are applied.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2024-47569: Information disclosure in Fortinet FortiVoice
Description
A insertion of sensitive information into sent data in Fortinet FortiManager Cloud 7.4.1 through 7.4.3, FortiVoice 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.7 through 6.0.12, FortiMail 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.9, FortiOS 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, 6.2.0 through 6.2.17, 6.0.0 through 6.0.18, FortiWeb 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.11, 7.0.0 through 7.0.11, 6.4.0 through 6.4.3, FortiRecorder 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiNDR 7.6.0 through 7.6.1, 7.4.0 through 7.4.8, 7.2.0 through 7.2.5, 7.1.0 through 7.1.1, 7.0.0 through 7.0.7, 1.5.0 through 1.5.3, FortiPAM 1.3.0 through 1.3.1, 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiTester 7.4.0 through 7.4.2, 7.3.0 through 7.3.2, 7.2.0 through 7.2.3, 7.1.0 through 7.1.1, 7.0.0, 4.2.0 through 4.2.1, FortiProxy 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.21, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiManager 7.6.0 through 7.6.1, 7.4.1 through 7.4.3 allows attacker to disclose sensitive information via specially crafted packets.
AI-Powered Analysis
Technical Analysis
CVE-2024-47569 is an information disclosure vulnerability identified in multiple Fortinet products, notably FortiVoice versions 6.0.7 through 7.0.4, as well as FortiManager Cloud, FortiMail, FortiOS, FortiWeb, FortiRecorder, FortiNDR, FortiPAM, FortiTester, FortiProxy, and FortiManager across various versions. The vulnerability arises from improper handling of data packets, where specially crafted packets sent by an attacker can cause sensitive information to be inserted into outgoing data streams. This flaw allows an attacker with network-level access and low privileges (PR:L) to extract confidential information without requiring user interaction or causing disruption to system integrity or availability. The CVSS 3.1 base score is 4.2 (medium), reflecting the limited scope and impact. The vulnerability affects a broad range of Fortinet products used for voice communications, email security, web application security, network detection and response, privileged access management, and proxy services. The flaw could expose sensitive configuration data, credentials, or other confidential information that may facilitate further attacks if leveraged. No known exploits are currently reported in the wild, but the complexity of exploitation is low given network access and no user interaction needed. The vulnerability was publicly disclosed on October 14, 2025, and remains unpatched in some versions, emphasizing the need for immediate attention by affected organizations.
Potential Impact
For European organizations, the information disclosure vulnerability poses a risk of leaking sensitive data such as configuration details, credentials, or internal communications, which could be leveraged by threat actors for lateral movement, espionage, or targeted attacks. Organizations relying on Fortinet FortiVoice and related products for critical communications, email security, or network defense could see confidentiality compromised, potentially affecting business operations, regulatory compliance (e.g., GDPR), and customer trust. While the vulnerability does not impact integrity or availability directly, the exposure of sensitive information can facilitate more severe attacks. Given the widespread use of Fortinet products across European enterprises, telecom providers, and government agencies, the risk is significant especially where network segmentation or access controls are weak. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once details are public. The medium severity rating suggests prioritizing remediation but not immediate emergency response unless combined with other vulnerabilities or active exploitation.
Mitigation Recommendations
1. Apply official patches and updates from Fortinet as soon as they become available for all affected products and versions. 2. Restrict network access to management interfaces and Fortinet devices to trusted internal networks and VPNs only, minimizing exposure to untrusted networks. 3. Implement strict network segmentation to isolate Fortinet devices from general user traffic and external access. 4. Monitor network traffic for unusual or malformed packets targeting Fortinet devices, which may indicate exploitation attempts. 5. Conduct regular audits of Fortinet device configurations and logs to detect unauthorized access or data leakage. 6. Employ multi-factor authentication and least privilege principles for accounts with access to Fortinet management interfaces. 7. Engage with Fortinet support and threat intelligence sources to stay informed about emerging exploits or additional mitigation guidance. 8. Consider deploying intrusion detection/prevention systems tuned to detect attempts to exploit this vulnerability. 9. Educate security teams about the vulnerability specifics to improve incident response readiness. 10. For critical environments, consider temporary compensating controls such as disabling vulnerable services or isolating affected devices until patches are applied.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- fortinet
- Date Reserved
- 2024-09-27T16:19:24.136Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee702b75ce224a0426b549
Added to database: 10/14/2025, 3:45:47 PM
Last enriched: 10/14/2025, 3:53:09 PM
Last updated: 10/16/2025, 10:04:09 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-45324: Execute unauthorized code or commands in Fortinet FortiOS
HighCVE-2024-40588: Improper access control in Fortinet FortiNDR
MediumCVE-2025-6338: CWE-459 Incomplete Cleanup in The Qt Company Qt
CriticalFour-Year Prison Sentence for PowerSchool Hacker
MediumCVE-2025-55091: CWE-125 Out-of-bounds Read in Eclipse Foundation NetX Duo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.