CVE-2025-55717: Information disclosure in Fortinet FortiVoice
A cleartext storage of sensitive information vulnerability [CWE-312] vulnerability in Fortinet FortiMail 7.6.0 through 7.6.2, FortiMail 7.4.0 through 7.4.4, FortiMail 7.2.0 through 7.2.7, FortiMail 7.0.0 through 7.0.8, FortiRecorder 7.2.0 through 7.2.3, FortiRecorder 7.0 all versions, FortiRecorder 6.4 all versions, FortiVoice 7.2.0, FortiVoice 7.0.0 through 7.0.6 may allow an authenticated malicious administrator to obtain user's secrets via CLI commands. Practical exploitability is limited by conditions out of the control of the attacker: An admin must log in to the targeted device.
AI Analysis
Technical Summary
CVE-2025-55717 is a vulnerability classified under CWE-312 (cleartext storage of sensitive information) affecting multiple Fortinet products, including FortiVoice (versions 7.0.0 through 7.0.6 and 7.2.0), FortiMail (various 7.x versions), and FortiRecorder (multiple versions). The flaw allows an authenticated administrator with high privileges to retrieve sensitive user secrets stored in cleartext by issuing specific CLI commands. Since the sensitive information is not properly encrypted or protected at rest, it can be exposed to malicious insiders or attackers who have gained administrative access. The vulnerability requires the attacker to be an authenticated administrator and to interact with the device via CLI, which limits the attack surface and practical exploitability. The CVSS v3.1 score is 3.8 (low severity), reflecting the requirement for high privileges and user interaction, and the impact is primarily on confidentiality without affecting integrity or availability. No public exploits or widespread attacks have been reported to date. The vulnerability was published in March 2026 and remains a concern for organizations relying on these Fortinet products for voice, mail, and recording services.
Potential Impact
The primary impact of CVE-2025-55717 is the potential unauthorized disclosure of sensitive user information stored in cleartext on affected Fortinet devices. This can lead to privacy violations, leakage of credentials or personal data, and potential further compromise if the disclosed secrets are leveraged for lateral movement or privilege escalation. However, the requirement for authenticated administrative access significantly reduces the risk of external attackers exploiting this vulnerability remotely. The threat is more relevant for insider threats or attackers who have already compromised administrative credentials. Organizations with large deployments of FortiVoice, FortiMail, or FortiRecorder may face increased risk if administrative access controls are weak or if logs and secrets are not adequately protected. The vulnerability does not impact system integrity or availability, so service disruption is unlikely. Overall, the impact is moderate but should not be ignored, especially in environments with sensitive communications or regulatory compliance requirements.
Mitigation Recommendations
To mitigate CVE-2025-55717, organizations should take the following specific actions: 1) Immediately restrict administrative access to Fortinet devices to trusted personnel only, employing strong authentication methods such as multi-factor authentication (MFA). 2) Monitor and audit administrative logins and CLI command usage to detect suspicious activity or unauthorized access attempts. 3) Apply vendor-provided patches or updates as soon as they become available to address the cleartext storage issue. 4) Encrypt sensitive data at rest where possible, or configure devices to minimize storage of sensitive information in cleartext. 5) Regularly review and rotate administrative credentials to reduce the risk of credential compromise. 6) Implement network segmentation to isolate management interfaces and reduce exposure to potential attackers. 7) Educate administrators about the risks of insider threats and the importance of secure handling of sensitive information. These measures go beyond generic advice by focusing on administrative access control, monitoring, and proactive patch management tailored to the nature of this vulnerability.
Affected Countries
United States, Germany, United Kingdom, France, Japan, Australia, Canada, Singapore, South Korea, Brazil
CVE-2025-55717: Information disclosure in Fortinet FortiVoice
Description
A cleartext storage of sensitive information vulnerability [CWE-312] vulnerability in Fortinet FortiMail 7.6.0 through 7.6.2, FortiMail 7.4.0 through 7.4.4, FortiMail 7.2.0 through 7.2.7, FortiMail 7.0.0 through 7.0.8, FortiRecorder 7.2.0 through 7.2.3, FortiRecorder 7.0 all versions, FortiRecorder 6.4 all versions, FortiVoice 7.2.0, FortiVoice 7.0.0 through 7.0.6 may allow an authenticated malicious administrator to obtain user's secrets via CLI commands. Practical exploitability is limited by conditions out of the control of the attacker: An admin must log in to the targeted device.
AI-Powered Analysis
Technical Analysis
CVE-2025-55717 is a vulnerability classified under CWE-312 (cleartext storage of sensitive information) affecting multiple Fortinet products, including FortiVoice (versions 7.0.0 through 7.0.6 and 7.2.0), FortiMail (various 7.x versions), and FortiRecorder (multiple versions). The flaw allows an authenticated administrator with high privileges to retrieve sensitive user secrets stored in cleartext by issuing specific CLI commands. Since the sensitive information is not properly encrypted or protected at rest, it can be exposed to malicious insiders or attackers who have gained administrative access. The vulnerability requires the attacker to be an authenticated administrator and to interact with the device via CLI, which limits the attack surface and practical exploitability. The CVSS v3.1 score is 3.8 (low severity), reflecting the requirement for high privileges and user interaction, and the impact is primarily on confidentiality without affecting integrity or availability. No public exploits or widespread attacks have been reported to date. The vulnerability was published in March 2026 and remains a concern for organizations relying on these Fortinet products for voice, mail, and recording services.
Potential Impact
The primary impact of CVE-2025-55717 is the potential unauthorized disclosure of sensitive user information stored in cleartext on affected Fortinet devices. This can lead to privacy violations, leakage of credentials or personal data, and potential further compromise if the disclosed secrets are leveraged for lateral movement or privilege escalation. However, the requirement for authenticated administrative access significantly reduces the risk of external attackers exploiting this vulnerability remotely. The threat is more relevant for insider threats or attackers who have already compromised administrative credentials. Organizations with large deployments of FortiVoice, FortiMail, or FortiRecorder may face increased risk if administrative access controls are weak or if logs and secrets are not adequately protected. The vulnerability does not impact system integrity or availability, so service disruption is unlikely. Overall, the impact is moderate but should not be ignored, especially in environments with sensitive communications or regulatory compliance requirements.
Mitigation Recommendations
To mitigate CVE-2025-55717, organizations should take the following specific actions: 1) Immediately restrict administrative access to Fortinet devices to trusted personnel only, employing strong authentication methods such as multi-factor authentication (MFA). 2) Monitor and audit administrative logins and CLI command usage to detect suspicious activity or unauthorized access attempts. 3) Apply vendor-provided patches or updates as soon as they become available to address the cleartext storage issue. 4) Encrypt sensitive data at rest where possible, or configure devices to minimize storage of sensitive information in cleartext. 5) Regularly review and rotate administrative credentials to reduce the risk of credential compromise. 6) Implement network segmentation to isolate management interfaces and reduce exposure to potential attackers. 7) Educate administrators about the risks of insider threats and the importance of secure handling of sensitive information. These measures go beyond generic advice by focusing on administrative access control, monitoring, and proactive patch management tailored to the nature of this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fortinet
- Date Reserved
- 2025-08-14T12:37:31.087Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b05634ea502d3aa87d6bb8
Added to database: 3/10/2026, 5:34:44 PM
Last enriched: 3/10/2026, 5:54:29 PM
Last updated: 3/13/2026, 11:45:32 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.