Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58693: Execute unauthorized code or commands in Fortinet FortiVoice

0
Medium
VulnerabilityCVE-2025-58693cvecve-2025-58693
Published: Tue Jan 13 2026 (01/13/2026, 16:32:29 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiVoice

Description

CVE-2025-58693 is a path traversal vulnerability in Fortinet FortiVoice versions 7. 0. 0 through 7. 0. 7 and 7. 2. 0 through 7. 2. 2. It allows a privileged attacker to delete files on the underlying filesystem by sending crafted HTTP or HTTPS requests.

AI-Powered Analysis

AILast updated: 01/13/2026, 17:13:40 UTC

Technical Analysis

CVE-2025-58693 is a path traversal vulnerability identified in Fortinet FortiVoice telephony products, specifically versions 7.0.0 through 7.0.7 and 7.2.0 through 7.2.2. The flaw arises from improper limitation of pathnames to restricted directories, enabling a privileged attacker to craft HTTP or HTTPS requests that traverse directories and delete files outside the intended scope. This vulnerability does not require user interaction but does require the attacker to have high-level privileges on the system, such as administrative or root access. Exploiting this vulnerability can lead to deletion of critical system files, impacting the integrity and availability of the FortiVoice device and potentially disrupting telephony services. The vulnerability has a CVSS 3.1 base score of 5.7, indicating a medium severity level due to the requirement for privileged access and the lack of confidentiality impact. No known exploits have been reported in the wild as of the publication date, but the potential for disruption in telephony infrastructure is significant. FortiVoice devices are commonly deployed in enterprise and service provider environments for voice communication management, making this vulnerability a concern for organizations relying on these systems. The vulnerability underscores the importance of strict access controls and timely patching to prevent unauthorized filesystem manipulation via network vectors.

Potential Impact

For European organizations, the impact of CVE-2025-58693 could be substantial, especially for those relying on FortiVoice systems for critical telephony and unified communications infrastructure. Successful exploitation could lead to deletion of essential system files, causing service outages, degraded voice communication capabilities, and potential loss of business continuity. This could affect call routing, voicemail, and other telephony features, disrupting internal and external communications. The integrity of the telephony system is compromised, and availability is directly impacted, which could have cascading effects on customer service, emergency response, and operational workflows. Organizations in sectors such as finance, healthcare, government, and telecommunications are particularly vulnerable due to their reliance on uninterrupted voice communications. Additionally, the requirement for privileged access means insider threats or attackers who have already compromised administrative credentials pose the greatest risk. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

To mitigate CVE-2025-58693, European organizations should implement the following specific actions: 1) Immediately restrict administrative access to FortiVoice devices to trusted personnel and networks, employing network segmentation and VPNs where possible. 2) Enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. 3) Monitor HTTP and HTTPS traffic to FortiVoice devices for unusual or malformed requests indicative of path traversal attempts. 4) Regularly audit system logs for signs of unauthorized file deletions or suspicious activity. 5) Apply vendor patches and updates as soon as they become available, prioritizing affected FortiVoice versions. 6) Conduct internal security reviews and penetration testing focused on telephony infrastructure to identify potential privilege escalation paths. 7) Implement robust backup and recovery procedures for FortiVoice configurations and data to enable rapid restoration in case of file deletion or system compromise. 8) Educate administrators on the risks of path traversal vulnerabilities and the importance of maintaining strict access controls. These measures go beyond generic advice by focusing on access restriction, monitoring, and recovery tailored to the telephony environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-09-03T11:48:42.097Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69667940a60475309f8fa697

Added to database: 1/13/2026, 4:56:32 PM

Last enriched: 1/13/2026, 5:13:40 PM

Last updated: 1/13/2026, 6:12:32 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats