Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60024: Escalation of privilege in Fortinet FortiVoice

0
High
VulnerabilityCVE-2025-60024cvecve-2025-60024
Published: Tue Dec 09 2025 (12/09/2025, 17:18:44 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiVoice

Description

Multiple Improper Limitations of a Pathname to a Restricted Directory ('Path Traversal') vulnerabilities [CWE-22] vulnerability in Fortinet FortiVoice 7.2.0 through 7.2.2, FortiVoice 7.0.0 through 7.0.7 may allow a privileged authenticated attacker to write arbitrary files via specifically HTTP or HTTPS commands

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:49:14 UTC

Technical Analysis

CVE-2025-60024 is a path traversal vulnerability affecting Fortinet FortiVoice versions 7.0.0 through 7.0.7 and 7.2.0 through 7.2.2. The flaw stems from improper limitation of pathname inputs, classified under CWE-22, which allows an attacker with privileged authentication to craft HTTP or HTTPS requests that write arbitrary files to the device’s filesystem. This arbitrary file write capability can be leveraged to escalate privileges, modify system configurations, implant persistent malware, or disrupt telephony services. The vulnerability requires the attacker to have some level of authenticated access with elevated privileges, but no user interaction is needed beyond that. The CVSS v3.1 score of 7.7 reflects a high severity, with network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. The vulnerability affects core telephony infrastructure devices used in enterprise and service provider environments, making it a critical concern for organizations relying on FortiVoice for voice communications. Although no public exploits have been reported yet, the potential for impactful exploitation is high given the nature of the vulnerability and the critical role of affected devices.

Potential Impact

The exploitation of CVE-2025-60024 can lead to severe consequences for organizations globally. Attackers who gain privileged authenticated access can write arbitrary files, potentially leading to full system compromise, including unauthorized access to sensitive voice communications, disruption of telephony services, and persistent backdoors. This can result in loss of confidentiality of communications, integrity violations through configuration or firmware tampering, and availability issues causing denial of service. Enterprises relying on FortiVoice for internal or customer-facing voice services may face operational disruptions, reputational damage, and regulatory compliance issues. Service providers using FortiVoice in their infrastructure could see widespread service outages or interception of communications. The vulnerability’s network accessibility and high impact make it a significant risk, especially in environments where privileged credentials may be exposed or weakly protected.

Mitigation Recommendations

Organizations should immediately review and restrict privileged access to FortiVoice management interfaces, ensuring only trusted personnel have elevated credentials. Network segmentation should be employed to isolate FortiVoice devices from untrusted networks and limit exposure to potential attackers. Fortinet should be monitored for official patches or firmware updates addressing CVE-2025-60024, and these should be applied promptly once available. In the interim, implement strict logging and monitoring of HTTP/HTTPS requests to FortiVoice devices to detect suspicious path traversal attempts. Employ multi-factor authentication (MFA) for all administrative access to reduce the risk of credential compromise. Conduct regular audits of FortiVoice configurations and file system integrity to detect unauthorized changes. If possible, deploy web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to block path traversal patterns targeting FortiVoice. Finally, educate administrators on the risks of this vulnerability and the importance of credential hygiene.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-09-25T07:32:39.417Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69385e4e74ebaa3baba142ac

Added to database: 12/9/2025, 5:37:18 PM

Last enriched: 2/27/2026, 5:49:14 AM

Last updated: 3/24/2026, 12:21:15 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses