Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47855: Improper access control in Fortinet FortiFone

0
Critical
VulnerabilityCVE-2025-47855cvecve-2025-47855
Published: Tue Jan 13 2026 (01/13/2026, 16:32:29 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiFone

Description

An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in Fortinet FortiFone 7.0.0 through 7.0.1, FortiFone 3.0.13 through 3.0.23 allows an unauthenticated attacker to obtain the device configuration via crafted HTTP or HTTPS requests.

AI-Powered Analysis

AILast updated: 01/13/2026, 17:11:24 UTC

Technical Analysis

CVE-2025-47855 is an improper access control vulnerability identified in Fortinet FortiFone IP telephony devices, specifically affecting versions 7.0.0 through 7.0.1 and 3.0.13 through 3.0.23. The flaw allows an unauthenticated attacker to obtain the full device configuration by sending specially crafted HTTP or HTTPS requests to the device's management interface. This vulnerability stems from insufficient validation and access control checks on requests that expose sensitive configuration data, violating CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The vulnerability is remotely exploitable over the network without any authentication or user interaction, making it highly accessible to attackers. The CVSS v3.1 base score of 9.3 reflects the critical nature of this flaw, with high impact on confidentiality, integrity, and availability. Compromise of device configuration can reveal sensitive credentials, network topology, and telephony settings, potentially enabling further lateral movement, interception of communications, or denial of service. Although no public exploits have been reported yet, the vulnerability's characteristics suggest it could be weaponized quickly. Fortinet has not yet published patches or mitigation details, but organizations are urged to monitor vendor advisories closely. FortiFone devices are commonly used in enterprise and government telephony infrastructure, making this vulnerability particularly concerning for organizations relying on secure voice communications.

Potential Impact

The impact of CVE-2025-47855 on European organizations is significant due to the critical nature of the vulnerability and the widespread use of Fortinet FortiFone devices in enterprise and government sectors across Europe. Successful exploitation can lead to unauthorized disclosure of sensitive configuration data, including credentials and network settings, which can facilitate further attacks such as network intrusion, eavesdropping on voice communications, and disruption of telephony services. This can compromise confidentiality and integrity of communications and potentially disrupt availability of critical telephony infrastructure. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly at risk due to their reliance on secure voice communications. The exposure of configuration data could also aid attackers in crafting targeted attacks or gaining persistent access. Given the ease of exploitation without authentication, the threat landscape is broad, increasing the likelihood of opportunistic attacks. The absence of known exploits in the wild currently provides a window for proactive defense, but the critical severity demands urgent attention.

Mitigation Recommendations

1. Immediately restrict access to FortiFone management interfaces by implementing network segmentation and firewall rules to limit HTTP/HTTPS access only to trusted administrative hosts. 2. Employ VPN or secure management channels to access FortiFone devices, preventing direct exposure to the internet or untrusted networks. 3. Monitor network traffic for unusual or malformed HTTP/HTTPS requests targeting FortiFone devices, using IDS/IPS or SIEM solutions to detect potential exploitation attempts. 4. Disable or limit unnecessary management protocols and services on FortiFone devices to reduce the attack surface. 5. Regularly audit device configurations and access logs for signs of unauthorized access or configuration changes. 6. Stay informed on Fortinet security advisories and apply official patches or firmware updates as soon as they become available. 7. Consider deploying compensating controls such as multi-factor authentication for management access if supported by the device. 8. Conduct internal vulnerability assessments and penetration tests focusing on FortiFone devices to identify exposure and validate mitigations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-05-12T13:58:15.235Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69667940a60475309f8fa691

Added to database: 1/13/2026, 4:56:32 PM

Last enriched: 1/13/2026, 5:11:24 PM

Last updated: 1/14/2026, 1:10:45 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats