CVE-2025-58693: Execute unauthorized code or commands in Fortinet FortiVoice
CVE-2025-58693 is a path traversal vulnerability in Fortinet FortiVoice versions 7. 0. 0 through 7. 0. 7 and 7. 2. 0 through 7. 2. 2. It allows a privileged attacker to delete files on the underlying filesystem by sending crafted HTTP or HTTPS requests.
AI Analysis
Technical Summary
CVE-2025-58693 is a path traversal vulnerability identified in Fortinet FortiVoice telephony products, specifically versions 7.0.0 through 7.0.7 and 7.2.0 through 7.2.2. The flaw arises from improper limitation of pathnames to restricted directories, enabling a privileged attacker to craft HTTP or HTTPS requests that traverse directories and delete files outside the intended scope. This vulnerability does not require user interaction but does require the attacker to have high-level privileges on the system, such as administrative or root access. Exploiting this vulnerability can lead to deletion of critical system files, impacting the integrity and availability of the FortiVoice device and potentially disrupting telephony services. The vulnerability has a CVSS 3.1 base score of 5.7, indicating a medium severity level due to the requirement for privileged access and the lack of confidentiality impact. No known exploits have been reported in the wild as of the publication date, but the potential for disruption in telephony infrastructure is significant. FortiVoice devices are commonly deployed in enterprise and service provider environments for voice communication management, making this vulnerability a concern for organizations relying on these systems. The vulnerability underscores the importance of strict access controls and timely patching to prevent unauthorized filesystem manipulation via network vectors.
Potential Impact
For European organizations, the impact of CVE-2025-58693 could be substantial, especially for those relying on FortiVoice systems for critical telephony and unified communications infrastructure. Successful exploitation could lead to deletion of essential system files, causing service outages, degraded voice communication capabilities, and potential loss of business continuity. This could affect call routing, voicemail, and other telephony features, disrupting internal and external communications. The integrity of the telephony system is compromised, and availability is directly impacted, which could have cascading effects on customer service, emergency response, and operational workflows. Organizations in sectors such as finance, healthcare, government, and telecommunications are particularly vulnerable due to their reliance on uninterrupted voice communications. Additionally, the requirement for privileged access means insider threats or attackers who have already compromised administrative credentials pose the greatest risk. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
To mitigate CVE-2025-58693, European organizations should implement the following specific actions: 1) Immediately restrict administrative access to FortiVoice devices to trusted personnel and networks, employing network segmentation and VPNs where possible. 2) Enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. 3) Monitor HTTP and HTTPS traffic to FortiVoice devices for unusual or malformed requests indicative of path traversal attempts. 4) Regularly audit system logs for signs of unauthorized file deletions or suspicious activity. 5) Apply vendor patches and updates as soon as they become available, prioritizing affected FortiVoice versions. 6) Conduct internal security reviews and penetration testing focused on telephony infrastructure to identify potential privilege escalation paths. 7) Implement robust backup and recovery procedures for FortiVoice configurations and data to enable rapid restoration in case of file deletion or system compromise. 8) Educate administrators on the risks of path traversal vulnerabilities and the importance of maintaining strict access controls. These measures go beyond generic advice by focusing on access restriction, monitoring, and recovery tailored to the telephony environment.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Switzerland
CVE-2025-58693: Execute unauthorized code or commands in Fortinet FortiVoice
Description
CVE-2025-58693 is a path traversal vulnerability in Fortinet FortiVoice versions 7. 0. 0 through 7. 0. 7 and 7. 2. 0 through 7. 2. 2. It allows a privileged attacker to delete files on the underlying filesystem by sending crafted HTTP or HTTPS requests.
AI-Powered Analysis
Technical Analysis
CVE-2025-58693 is a path traversal vulnerability identified in Fortinet FortiVoice telephony products, specifically versions 7.0.0 through 7.0.7 and 7.2.0 through 7.2.2. The flaw arises from improper limitation of pathnames to restricted directories, enabling a privileged attacker to craft HTTP or HTTPS requests that traverse directories and delete files outside the intended scope. This vulnerability does not require user interaction but does require the attacker to have high-level privileges on the system, such as administrative or root access. Exploiting this vulnerability can lead to deletion of critical system files, impacting the integrity and availability of the FortiVoice device and potentially disrupting telephony services. The vulnerability has a CVSS 3.1 base score of 5.7, indicating a medium severity level due to the requirement for privileged access and the lack of confidentiality impact. No known exploits have been reported in the wild as of the publication date, but the potential for disruption in telephony infrastructure is significant. FortiVoice devices are commonly deployed in enterprise and service provider environments for voice communication management, making this vulnerability a concern for organizations relying on these systems. The vulnerability underscores the importance of strict access controls and timely patching to prevent unauthorized filesystem manipulation via network vectors.
Potential Impact
For European organizations, the impact of CVE-2025-58693 could be substantial, especially for those relying on FortiVoice systems for critical telephony and unified communications infrastructure. Successful exploitation could lead to deletion of essential system files, causing service outages, degraded voice communication capabilities, and potential loss of business continuity. This could affect call routing, voicemail, and other telephony features, disrupting internal and external communications. The integrity of the telephony system is compromised, and availability is directly impacted, which could have cascading effects on customer service, emergency response, and operational workflows. Organizations in sectors such as finance, healthcare, government, and telecommunications are particularly vulnerable due to their reliance on uninterrupted voice communications. Additionally, the requirement for privileged access means insider threats or attackers who have already compromised administrative credentials pose the greatest risk. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
To mitigate CVE-2025-58693, European organizations should implement the following specific actions: 1) Immediately restrict administrative access to FortiVoice devices to trusted personnel and networks, employing network segmentation and VPNs where possible. 2) Enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. 3) Monitor HTTP and HTTPS traffic to FortiVoice devices for unusual or malformed requests indicative of path traversal attempts. 4) Regularly audit system logs for signs of unauthorized file deletions or suspicious activity. 5) Apply vendor patches and updates as soon as they become available, prioritizing affected FortiVoice versions. 6) Conduct internal security reviews and penetration testing focused on telephony infrastructure to identify potential privilege escalation paths. 7) Implement robust backup and recovery procedures for FortiVoice configurations and data to enable rapid restoration in case of file deletion or system compromise. 8) Educate administrators on the risks of path traversal vulnerabilities and the importance of maintaining strict access controls. These measures go beyond generic advice by focusing on access restriction, monitoring, and recovery tailored to the telephony environment.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fortinet
- Date Reserved
- 2025-09-03T11:48:42.097Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69667940a60475309f8fa697
Added to database: 1/13/2026, 4:56:32 PM
Last enriched: 1/13/2026, 5:13:40 PM
Last updated: 1/13/2026, 6:12:32 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21265: CWE-1329 - Reliance on Component That is Not Updateable in Microsoft Windows 10 Version 1809
MediumCVE-2026-21224: CWE-121: Stack-based Buffer Overflow in Microsoft Azure Connected Machine Agent
HighCVE-2026-21221: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Microsoft Windows Server 2025 (Server Core installation)
HighCVE-2026-21219: CWE-416: Use After Free in Microsoft Windows SDK
HighCVE-2026-20965: CWE-347: Improper Verification of Cryptographic Signature in Microsoft Windows Admin Center in Azure Portal
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.