CVE-2025-47855: Improper access control in Fortinet FortiFone
CVE-2025-47855 is a critical improper access control vulnerability in Fortinet FortiFone versions 7. 0. 0 through 7. 0. 1 and 3. 0. 13 through 3. 0. 23. It allows unauthenticated attackers to retrieve sensitive device configuration data by sending specially crafted HTTP or HTTPS requests.
AI Analysis
Technical Summary
CVE-2025-47855 is an improper access control vulnerability affecting Fortinet FortiFone devices, specifically versions 7.0.0 through 7.0.1 and 3.0.13 through 3.0.23. The flaw allows an unauthenticated attacker to send crafted HTTP or HTTPS requests to the device, bypassing authentication mechanisms and retrieving sensitive configuration information. This exposure can include network settings, credentials, and telephony configurations, which can be leveraged for further attacks such as network intrusion, interception of communications, or lateral movement within an organization. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information) and has a CVSS v3.1 base score of 9.3, reflecting its critical severity. The attack vector is network-based with no privileges or user interaction required, making exploitation straightforward for remote attackers. Although no public exploits have been reported yet, the vulnerability’s characteristics suggest that exploit development is feasible and likely. FortiFone devices are commonly deployed in enterprise environments for VoIP telephony, making this vulnerability particularly impactful for organizations relying on these systems for critical communications. The exposure of configuration data can compromise confidentiality, integrity, and availability of telephony services and potentially broader network infrastructure. The vulnerability was publicly disclosed in January 2026, with Fortinet expected to release patches. Until patches are applied, organizations remain vulnerable to remote compromise.
Potential Impact
For European organizations, the impact of CVE-2025-47855 is significant due to the widespread use of Fortinet FortiFone devices in enterprise telephony and communication infrastructure. Exposure of device configurations can lead to unauthorized access to sensitive network and telephony settings, enabling attackers to intercept calls, disrupt communications, or pivot to other internal systems. This can affect confidentiality of communications, integrity of telephony services, and availability of critical voice infrastructure. Industries such as finance, healthcare, government, and critical infrastructure operators in Europe are particularly at risk due to their reliance on secure and reliable communications. The vulnerability could facilitate espionage, data theft, or sabotage, especially in countries with heightened geopolitical tensions. Additionally, the ease of exploitation without authentication increases the likelihood of opportunistic attacks. The potential for cascading effects on broader network security elevates the threat level for European organizations using FortiFone devices.
Mitigation Recommendations
1. Immediate application of vendor patches once released by Fortinet is essential to remediate the vulnerability. 2. Until patches are available, restrict access to FortiFone management interfaces by implementing network segmentation and firewall rules that limit HTTP/HTTPS access to trusted internal IP addresses only. 3. Deploy intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious HTTP/HTTPS requests targeting FortiFone devices. 4. Conduct regular audits of FortiFone device configurations and access logs to detect unauthorized access attempts. 5. Use strong network access controls and multi-factor authentication for administrative access where possible, even though the vulnerability allows unauthenticated access, to reduce overall attack surface. 6. Educate IT and security teams about the vulnerability and encourage proactive monitoring for indicators of compromise. 7. Consider isolating VoIP infrastructure from general corporate networks to limit exposure. 8. Maintain up-to-date asset inventories to quickly identify affected FortiFone devices for prioritized remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-47855: Improper access control in Fortinet FortiFone
Description
CVE-2025-47855 is a critical improper access control vulnerability in Fortinet FortiFone versions 7. 0. 0 through 7. 0. 1 and 3. 0. 13 through 3. 0. 23. It allows unauthenticated attackers to retrieve sensitive device configuration data by sending specially crafted HTTP or HTTPS requests.
AI-Powered Analysis
Technical Analysis
CVE-2025-47855 is an improper access control vulnerability affecting Fortinet FortiFone devices, specifically versions 7.0.0 through 7.0.1 and 3.0.13 through 3.0.23. The flaw allows an unauthenticated attacker to send crafted HTTP or HTTPS requests to the device, bypassing authentication mechanisms and retrieving sensitive configuration information. This exposure can include network settings, credentials, and telephony configurations, which can be leveraged for further attacks such as network intrusion, interception of communications, or lateral movement within an organization. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information) and has a CVSS v3.1 base score of 9.3, reflecting its critical severity. The attack vector is network-based with no privileges or user interaction required, making exploitation straightforward for remote attackers. Although no public exploits have been reported yet, the vulnerability’s characteristics suggest that exploit development is feasible and likely. FortiFone devices are commonly deployed in enterprise environments for VoIP telephony, making this vulnerability particularly impactful for organizations relying on these systems for critical communications. The exposure of configuration data can compromise confidentiality, integrity, and availability of telephony services and potentially broader network infrastructure. The vulnerability was publicly disclosed in January 2026, with Fortinet expected to release patches. Until patches are applied, organizations remain vulnerable to remote compromise.
Potential Impact
For European organizations, the impact of CVE-2025-47855 is significant due to the widespread use of Fortinet FortiFone devices in enterprise telephony and communication infrastructure. Exposure of device configurations can lead to unauthorized access to sensitive network and telephony settings, enabling attackers to intercept calls, disrupt communications, or pivot to other internal systems. This can affect confidentiality of communications, integrity of telephony services, and availability of critical voice infrastructure. Industries such as finance, healthcare, government, and critical infrastructure operators in Europe are particularly at risk due to their reliance on secure and reliable communications. The vulnerability could facilitate espionage, data theft, or sabotage, especially in countries with heightened geopolitical tensions. Additionally, the ease of exploitation without authentication increases the likelihood of opportunistic attacks. The potential for cascading effects on broader network security elevates the threat level for European organizations using FortiFone devices.
Mitigation Recommendations
1. Immediate application of vendor patches once released by Fortinet is essential to remediate the vulnerability. 2. Until patches are available, restrict access to FortiFone management interfaces by implementing network segmentation and firewall rules that limit HTTP/HTTPS access to trusted internal IP addresses only. 3. Deploy intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious HTTP/HTTPS requests targeting FortiFone devices. 4. Conduct regular audits of FortiFone device configurations and access logs to detect unauthorized access attempts. 5. Use strong network access controls and multi-factor authentication for administrative access where possible, even though the vulnerability allows unauthenticated access, to reduce overall attack surface. 6. Educate IT and security teams about the vulnerability and encourage proactive monitoring for indicators of compromise. 7. Consider isolating VoIP infrastructure from general corporate networks to limit exposure. 8. Maintain up-to-date asset inventories to quickly identify affected FortiFone devices for prioritized remediation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fortinet
- Date Reserved
- 2025-05-12T13:58:15.235Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69667940a60475309f8fa691
Added to database: 1/13/2026, 4:56:32 PM
Last enriched: 1/21/2026, 2:40:58 AM
Last updated: 2/7/2026, 9:25:37 AM
Views: 99
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.