Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47855: Improper access control in Fortinet FortiFone

0
Critical
VulnerabilityCVE-2025-47855cvecve-2025-47855
Published: Tue Jan 13 2026 (01/13/2026, 16:32:29 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiFone

Description

CVE-2025-47855 is a critical improper access control vulnerability in Fortinet FortiFone versions 7. 0. 0 through 7. 0. 1 and 3. 0. 13 through 3. 0. 23. It allows unauthenticated attackers to retrieve sensitive device configuration data by sending specially crafted HTTP or HTTPS requests.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:40:58 UTC

Technical Analysis

CVE-2025-47855 is an improper access control vulnerability affecting Fortinet FortiFone devices, specifically versions 7.0.0 through 7.0.1 and 3.0.13 through 3.0.23. The flaw allows an unauthenticated attacker to send crafted HTTP or HTTPS requests to the device, bypassing authentication mechanisms and retrieving sensitive configuration information. This exposure can include network settings, credentials, and telephony configurations, which can be leveraged for further attacks such as network intrusion, interception of communications, or lateral movement within an organization. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information) and has a CVSS v3.1 base score of 9.3, reflecting its critical severity. The attack vector is network-based with no privileges or user interaction required, making exploitation straightforward for remote attackers. Although no public exploits have been reported yet, the vulnerability’s characteristics suggest that exploit development is feasible and likely. FortiFone devices are commonly deployed in enterprise environments for VoIP telephony, making this vulnerability particularly impactful for organizations relying on these systems for critical communications. The exposure of configuration data can compromise confidentiality, integrity, and availability of telephony services and potentially broader network infrastructure. The vulnerability was publicly disclosed in January 2026, with Fortinet expected to release patches. Until patches are applied, organizations remain vulnerable to remote compromise.

Potential Impact

For European organizations, the impact of CVE-2025-47855 is significant due to the widespread use of Fortinet FortiFone devices in enterprise telephony and communication infrastructure. Exposure of device configurations can lead to unauthorized access to sensitive network and telephony settings, enabling attackers to intercept calls, disrupt communications, or pivot to other internal systems. This can affect confidentiality of communications, integrity of telephony services, and availability of critical voice infrastructure. Industries such as finance, healthcare, government, and critical infrastructure operators in Europe are particularly at risk due to their reliance on secure and reliable communications. The vulnerability could facilitate espionage, data theft, or sabotage, especially in countries with heightened geopolitical tensions. Additionally, the ease of exploitation without authentication increases the likelihood of opportunistic attacks. The potential for cascading effects on broader network security elevates the threat level for European organizations using FortiFone devices.

Mitigation Recommendations

1. Immediate application of vendor patches once released by Fortinet is essential to remediate the vulnerability. 2. Until patches are available, restrict access to FortiFone management interfaces by implementing network segmentation and firewall rules that limit HTTP/HTTPS access to trusted internal IP addresses only. 3. Deploy intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious HTTP/HTTPS requests targeting FortiFone devices. 4. Conduct regular audits of FortiFone device configurations and access logs to detect unauthorized access attempts. 5. Use strong network access controls and multi-factor authentication for administrative access where possible, even though the vulnerability allows unauthenticated access, to reduce overall attack surface. 6. Educate IT and security teams about the vulnerability and encourage proactive monitoring for indicators of compromise. 7. Consider isolating VoIP infrastructure from general corporate networks to limit exposure. 8. Maintain up-to-date asset inventories to quickly identify affected FortiFone devices for prioritized remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-05-12T13:58:15.235Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69667940a60475309f8fa691

Added to database: 1/13/2026, 4:56:32 PM

Last enriched: 1/21/2026, 2:40:58 AM

Last updated: 2/7/2026, 10:42:06 AM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats