Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58692: Execute unauthorized code or commands in Fortinet FortiVoice

0
High
VulnerabilityCVE-2025-58692cvecve-2025-58692
Published: Tue Nov 18 2025 (11/18/2025, 17:01:13 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiVoice

Description

An improper neutralization of special elements used in an SQL Command ("SQL Injection") vulnerability [CWE-89] vulnerability in Fortinet FortiVoice 7.2.0 through 7.2.2, FortiVoice 7.0.0 through 7.0.7 allows an authenticated attacker to execute unauthorized code or commands via specifically crafted HTTP or HTTPS requests.

AI-Powered Analysis

AILast updated: 01/14/2026, 23:25:14 UTC

Technical Analysis

CVE-2025-58692 is a SQL Injection vulnerability affecting Fortinet FortiVoice versions 7.2.0 through 7.2.2 and 7.0.0 through 7.0.7. The flaw arises from improper neutralization of special elements in SQL commands, allowing an attacker with valid authentication to inject malicious SQL code via crafted HTTP or HTTPS requests. This injection can lead to unauthorized execution of arbitrary code or commands on the underlying system, potentially compromising the entire device. The vulnerability requires the attacker to have some level of authenticated access, but no user interaction is needed beyond sending the malicious request. The CVSS v3.1 score of 7.7 indicates high severity, with network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. FortiVoice is a telephony and unified communications product widely used in enterprise environments for voice over IP (VoIP) services. Exploitation could allow attackers to manipulate call data, intercept communications, disrupt telephony services, or pivot into internal networks. No public exploits are currently known, but the vulnerability is publicly disclosed and should be considered a significant risk. The lack of patch links suggests that Fortinet may be preparing or has recently released updates to address this issue. Organizations should prioritize identification of affected versions and restrict access to FortiVoice management interfaces to trusted networks only.

Potential Impact

For European organizations, the impact of CVE-2025-58692 can be severe. FortiVoice systems often handle critical telephony infrastructure, including call routing, voicemail, and unified communications. Exploitation could lead to unauthorized access to sensitive communications, disruption of voice services, and potential lateral movement within corporate networks. This can affect business continuity, confidentiality of communications, and compliance with data protection regulations such as GDPR. Industries relying heavily on VoIP, including finance, healthcare, government, and critical infrastructure sectors, are particularly vulnerable. The ability to execute arbitrary commands may allow attackers to install persistent backdoors or exfiltrate sensitive data. Given the network-facing nature of the vulnerability and low complexity of exploitation, attackers could rapidly compromise multiple systems if access controls are weak. This elevates the risk of widespread service outages and data breaches across European enterprises using FortiVoice.

Mitigation Recommendations

1. Immediately inventory and identify all FortiVoice devices running affected versions (7.2.0 through 7.2.2 and 7.0.0 through 7.0.7). 2. Apply official Fortinet patches as soon as they become available; monitor Fortinet advisories closely. 3. Restrict access to FortiVoice management interfaces to trusted internal networks or VPNs; block access from the public internet. 4. Implement strong authentication mechanisms and enforce least privilege for user accounts with access to FortiVoice. 5. Enable and review detailed logging of HTTP/HTTPS requests to detect anomalous or suspicious activity indicative of SQL injection attempts. 6. Conduct regular vulnerability scans and penetration tests focused on telephony infrastructure. 7. Segment FortiVoice systems from critical internal networks to limit lateral movement in case of compromise. 8. Educate administrators about the risks of SQL injection and the importance of timely patching. 9. Consider deploying Web Application Firewalls (WAF) or Intrusion Prevention Systems (IPS) with signatures to detect and block SQL injection payloads targeting FortiVoice. 10. Prepare incident response plans specifically addressing telephony system compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-09-03T11:48:42.097Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ca897209f2030fa01696a

Added to database: 11/18/2025, 5:10:47 PM

Last enriched: 1/14/2026, 11:25:14 PM

Last updated: 2/3/2026, 6:52:22 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats