Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60024: Escalation of privilege in Fortinet FortiVoice

0
High
VulnerabilityCVE-2025-60024cvecve-2025-60024
Published: Tue Dec 09 2025 (12/09/2025, 17:18:44 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiVoice

Description

Multiple Improper Limitations of a Pathname to a Restricted Directory ('Path Traversal') vulnerabilities [CWE-22] vulnerability in Fortinet FortiVoice 7.2.0 through 7.2.2, FortiVoice 7.0.0 through 7.0.7 may allow a privileged authenticated attacker to write arbitrary files via specifically HTTP or HTTPS commands

AI-Powered Analysis

AILast updated: 12/09/2025, 17:49:28 UTC

Technical Analysis

CVE-2025-60024 is a path traversal vulnerability affecting Fortinet FortiVoice versions 7.0.0 through 7.0.7 and 7.2.0 through 7.2.2. The flaw arises from improper restrictions on pathname inputs, allowing a privileged authenticated attacker to craft HTTP or HTTPS requests that write arbitrary files outside the intended directories. This can lead to escalation of privileges by overwriting critical system files or placing malicious scripts, potentially enabling full system compromise. The vulnerability does not require user interaction but does require the attacker to have some level of authentication, likely administrative or privileged user credentials. The CVSS 3.1 base score is 7.7, indicating high severity with network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. Although no public exploits are known yet, the vulnerability poses a significant risk to organizations relying on FortiVoice for telephony and unified communications. The flaw could be leveraged to disrupt voice services, intercept or manipulate sensitive communications, or gain persistent access to the device. FortiVoice is widely used in enterprise telephony environments, making this vulnerability particularly concerning for organizations with critical communications infrastructure. The vulnerability was reserved in late September 2025 and published in December 2025, with Fortinet expected to release patches. Until patches are applied, organizations should implement compensating controls such as limiting access to FortiVoice management interfaces and monitoring network traffic for suspicious activity.

Potential Impact

The vulnerability allows an attacker with privileged authentication to write arbitrary files, which can lead to full system compromise. This threatens the confidentiality of sensitive voice communications, the integrity of telephony configurations and logs, and the availability of voice services. For European organizations, disruption of telephony infrastructure can impact business operations, emergency communications, and regulatory compliance, especially in sectors like finance, healthcare, and government. The ability to escalate privileges and potentially execute arbitrary code increases the risk of lateral movement within networks and persistent footholds. Given the critical role of FortiVoice in unified communications, exploitation could also expose personally identifiable information (PII) and sensitive corporate data transmitted over voice channels. The lack of known exploits currently reduces immediate risk but does not diminish the urgency of mitigation due to the high potential impact.

Mitigation Recommendations

1. Apply official Fortinet patches for FortiVoice versions 7.0.0 through 7.0.7 and 7.2.0 through 7.2.2 as soon as they become available. 2. Restrict administrative access to FortiVoice management interfaces to trusted IP addresses and use VPNs or secure tunnels where possible. 3. Enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. 4. Monitor HTTP and HTTPS traffic to FortiVoice devices for unusual or malformed requests that could indicate exploitation attempts. 5. Regularly audit FortiVoice logs for signs of unauthorized file writes or configuration changes. 6. Segment FortiVoice devices on dedicated network segments to limit lateral movement if compromised. 7. Educate IT staff on the specific risks associated with this vulnerability and update incident response plans accordingly. 8. Consider deploying web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect path traversal attempts targeting FortiVoice.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-09-25T07:32:39.417Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69385e4e74ebaa3baba142ac

Added to database: 12/9/2025, 5:37:18 PM

Last enriched: 12/9/2025, 5:49:28 PM

Last updated: 12/11/2025, 7:30:16 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats