CVE-2025-60024: Escalation of privilege in Fortinet FortiVoice
Multiple Improper Limitations of a Pathname to a Restricted Directory ('Path Traversal') vulnerabilities [CWE-22] vulnerability in Fortinet FortiVoice 7.2.0 through 7.2.2, FortiVoice 7.0.0 through 7.0.7 may allow a privileged authenticated attacker to write arbitrary files via specifically HTTP or HTTPS commands
AI Analysis
Technical Summary
CVE-2025-60024 is a path traversal vulnerability affecting Fortinet FortiVoice versions 7.0.0 through 7.0.7 and 7.2.0 through 7.2.2. The flaw stems from improper limitation of pathname inputs, classified under CWE-22, which allows an attacker with privileged authentication to craft HTTP or HTTPS requests that write arbitrary files to the device’s filesystem. This arbitrary file write capability can be leveraged to escalate privileges, modify system configurations, implant persistent malware, or disrupt telephony services. The vulnerability requires the attacker to have some level of authenticated access with elevated privileges, but no user interaction is needed beyond that. The CVSS v3.1 score of 7.7 reflects a high severity, with network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. The vulnerability affects core telephony infrastructure devices used in enterprise and service provider environments, making it a critical concern for organizations relying on FortiVoice for voice communications. Although no public exploits have been reported yet, the potential for impactful exploitation is high given the nature of the vulnerability and the critical role of affected devices.
Potential Impact
The exploitation of CVE-2025-60024 can lead to severe consequences for organizations globally. Attackers who gain privileged authenticated access can write arbitrary files, potentially leading to full system compromise, including unauthorized access to sensitive voice communications, disruption of telephony services, and persistent backdoors. This can result in loss of confidentiality of communications, integrity violations through configuration or firmware tampering, and availability issues causing denial of service. Enterprises relying on FortiVoice for internal or customer-facing voice services may face operational disruptions, reputational damage, and regulatory compliance issues. Service providers using FortiVoice in their infrastructure could see widespread service outages or interception of communications. The vulnerability’s network accessibility and high impact make it a significant risk, especially in environments where privileged credentials may be exposed or weakly protected.
Mitigation Recommendations
Organizations should immediately review and restrict privileged access to FortiVoice management interfaces, ensuring only trusted personnel have elevated credentials. Network segmentation should be employed to isolate FortiVoice devices from untrusted networks and limit exposure to potential attackers. Fortinet should be monitored for official patches or firmware updates addressing CVE-2025-60024, and these should be applied promptly once available. In the interim, implement strict logging and monitoring of HTTP/HTTPS requests to FortiVoice devices to detect suspicious path traversal attempts. Employ multi-factor authentication (MFA) for all administrative access to reduce the risk of credential compromise. Conduct regular audits of FortiVoice configurations and file system integrity to detect unauthorized changes. If possible, deploy web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to block path traversal patterns targeting FortiVoice. Finally, educate administrators on the risks of this vulnerability and the importance of credential hygiene.
Affected Countries
United States, Germany, United Kingdom, France, Japan, Australia, Canada, India, Brazil, South Korea
CVE-2025-60024: Escalation of privilege in Fortinet FortiVoice
Description
Multiple Improper Limitations of a Pathname to a Restricted Directory ('Path Traversal') vulnerabilities [CWE-22] vulnerability in Fortinet FortiVoice 7.2.0 through 7.2.2, FortiVoice 7.0.0 through 7.0.7 may allow a privileged authenticated attacker to write arbitrary files via specifically HTTP or HTTPS commands
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-60024 is a path traversal vulnerability affecting Fortinet FortiVoice versions 7.0.0 through 7.0.7 and 7.2.0 through 7.2.2. The flaw stems from improper limitation of pathname inputs, classified under CWE-22, which allows an attacker with privileged authentication to craft HTTP or HTTPS requests that write arbitrary files to the device’s filesystem. This arbitrary file write capability can be leveraged to escalate privileges, modify system configurations, implant persistent malware, or disrupt telephony services. The vulnerability requires the attacker to have some level of authenticated access with elevated privileges, but no user interaction is needed beyond that. The CVSS v3.1 score of 7.7 reflects a high severity, with network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. The vulnerability affects core telephony infrastructure devices used in enterprise and service provider environments, making it a critical concern for organizations relying on FortiVoice for voice communications. Although no public exploits have been reported yet, the potential for impactful exploitation is high given the nature of the vulnerability and the critical role of affected devices.
Potential Impact
The exploitation of CVE-2025-60024 can lead to severe consequences for organizations globally. Attackers who gain privileged authenticated access can write arbitrary files, potentially leading to full system compromise, including unauthorized access to sensitive voice communications, disruption of telephony services, and persistent backdoors. This can result in loss of confidentiality of communications, integrity violations through configuration or firmware tampering, and availability issues causing denial of service. Enterprises relying on FortiVoice for internal or customer-facing voice services may face operational disruptions, reputational damage, and regulatory compliance issues. Service providers using FortiVoice in their infrastructure could see widespread service outages or interception of communications. The vulnerability’s network accessibility and high impact make it a significant risk, especially in environments where privileged credentials may be exposed or weakly protected.
Mitigation Recommendations
Organizations should immediately review and restrict privileged access to FortiVoice management interfaces, ensuring only trusted personnel have elevated credentials. Network segmentation should be employed to isolate FortiVoice devices from untrusted networks and limit exposure to potential attackers. Fortinet should be monitored for official patches or firmware updates addressing CVE-2025-60024, and these should be applied promptly once available. In the interim, implement strict logging and monitoring of HTTP/HTTPS requests to FortiVoice devices to detect suspicious path traversal attempts. Employ multi-factor authentication (MFA) for all administrative access to reduce the risk of credential compromise. Conduct regular audits of FortiVoice configurations and file system integrity to detect unauthorized changes. If possible, deploy web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to block path traversal patterns targeting FortiVoice. Finally, educate administrators on the risks of this vulnerability and the importance of credential hygiene.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fortinet
- Date Reserved
- 2025-09-25T07:32:39.417Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69385e4e74ebaa3baba142ac
Added to database: 12/9/2025, 5:37:18 PM
Last enriched: 2/27/2026, 5:49:14 AM
Last updated: 3/24/2026, 12:21:15 AM
Views: 87
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.