Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55717: Information disclosure in Fortinet FortiVoice

0
Low
VulnerabilityCVE-2025-55717cvecve-2025-55717
Published: Tue Mar 10 2026 (03/10/2026, 16:44:08 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiVoice

Description

CVE-2025-55717 is a low-severity information disclosure vulnerability affecting Fortinet FortiVoice and related products. It involves cleartext storage of sensitive information, allowing an authenticated malicious administrator to retrieve user secrets via CLI commands. Exploitation requires high privileges and user interaction, specifically an admin login to the device. The vulnerability does not impact system integrity or availability but compromises confidentiality. No known exploits are currently reported in the wild. The affected versions include FortiVoice 7. 2. 0 and 7. 0. 0 through 7.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/17/2026, 19:18:48 UTC

Technical Analysis

CVE-2025-55717 is a vulnerability categorized under CWE-312, involving the cleartext storage of sensitive information within Fortinet FortiVoice and other Fortinet products such as FortiMail and FortiRecorder. The flaw exists in FortiVoice versions 7.2.0 and 7.0.0 through 7.0.6, as well as multiple versions of FortiMail and FortiRecorder. The vulnerability allows an authenticated administrator with high privileges to extract user secrets by executing specific CLI commands. This means that if an attacker gains administrative credentials and logs into the device, they can access sensitive data that should be protected, potentially including credentials or configuration secrets. The vulnerability does not allow remote unauthenticated exploitation, nor does it affect system integrity or availability. The CVSS v3.1 score is 3.8 (low), reflecting the requirement for high privileges, user interaction, and limited scope of impact. No public exploits have been reported, and practical exploitation is constrained by the need for an authenticated admin session. The vulnerability was publicly disclosed in March 2026, with Fortinet as the vendor. While patches are not explicitly linked in the provided data, it is expected that Fortinet will release updates to address this issue. The vulnerability highlights the risk of improper handling of sensitive data within administrative interfaces and the importance of secure credential storage and access controls.

Potential Impact

The primary impact of CVE-2025-55717 is the unauthorized disclosure of sensitive information, which compromises confidentiality. An attacker with administrative access could retrieve user secrets, potentially leading to further attacks such as lateral movement, privilege escalation, or data exfiltration. Although the vulnerability does not directly affect system integrity or availability, the exposure of sensitive credentials or configuration data can undermine overall security posture. Organizations relying on Fortinet FortiVoice and related products for secure communications or critical infrastructure may face increased risk of insider threats or compromised administrative accounts. The requirement for authenticated admin access limits the attack surface but does not eliminate risk, especially in environments with weak credential management or insufficient monitoring. The absence of known exploits in the wild reduces immediate threat but does not preclude future exploitation. Overall, the vulnerability could facilitate targeted attacks against organizations with Fortinet deployments, particularly those with high-value communications or sensitive user data.

Mitigation Recommendations

1. Restrict administrative access to Fortinet devices strictly to trusted personnel and use strong, unique credentials with multi-factor authentication where possible. 2. Regularly audit and monitor administrative logins and CLI command usage to detect suspicious activity promptly. 3. Apply the latest Fortinet security patches and firmware updates as soon as they become available to remediate the vulnerability. 4. Implement role-based access control (RBAC) to limit the scope of administrative privileges and reduce the risk of misuse. 5. Encrypt sensitive configuration files and secrets stored on devices if supported by the platform. 6. Conduct regular security assessments and penetration testing focusing on administrative interfaces. 7. Educate administrators on secure handling of credentials and the risks of exposing sensitive information via CLI commands. 8. Consider network segmentation to isolate management interfaces from general user networks, reducing exposure to potential attackers. 9. Maintain an incident response plan that includes procedures for compromised administrative credentials and information disclosure events.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-08-14T12:37:31.087Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b05634ea502d3aa87d6bb8

Added to database: 3/10/2026, 5:34:44 PM

Last enriched: 3/17/2026, 7:18:48 PM

Last updated: 4/28/2026, 7:25:57 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses