Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64156: Execute unauthorized code or commands in Fortinet FortiVoice

0
Medium
VulnerabilityCVE-2025-64156cvecve-2025-64156
Published: Tue Dec 09 2025 (12/09/2025, 17:18:45 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiVoice

Description

An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiVoice 7.2.0 through 7.2.2, FortiVoice 7.0.0 through 7.0.7, FortiVoice 6.4 all versions, FortiVoice 6.0 all versions may allow an authenticated privileged attacker to execute unauthorized code or commands via crafted requests

AI-Powered Analysis

AILast updated: 01/14/2026, 14:50:36 UTC

Technical Analysis

CVE-2025-64156 is a medium-severity SQL injection vulnerability affecting Fortinet FortiVoice versions 6.0 (all versions), 6.4 (all versions), 7.0.0 through 7.0.7, and 7.2.0 through 7.2.2. The vulnerability stems from improper neutralization of special elements used in SQL commands, allowing an attacker with authenticated privileged access to inject malicious SQL code. This can lead to unauthorized execution of code or commands on the underlying system. The attack vector is network-based, requiring no user interaction but necessitating high privileges, which implies the attacker must already have elevated access to the FortiVoice system. Successful exploitation can compromise confidentiality by exposing sensitive data, integrity by altering system or configuration data, and availability by disrupting telephony services. Although no public exploits are known at this time, the vulnerability is significant due to the critical role FortiVoice plays in enterprise telephony. The CVSS v3.1 score of 6.8 reflects the ease of network exploitation combined with the requirement for privileged access and the high impact on all security properties. FortiVoice is widely used in enterprise environments for voice communication, making this vulnerability a notable risk for organizations relying on this product for their telephony infrastructure.

Potential Impact

For European organizations, exploitation of CVE-2025-64156 could lead to severe disruptions in telephony services, potentially impacting business communications and operational continuity. Confidential data handled by FortiVoice systems, such as call logs, user credentials, or configuration details, could be exposed or manipulated, leading to privacy breaches and compliance violations under regulations like GDPR. Integrity of telephony configurations could be compromised, allowing attackers to redirect calls, intercept communications, or disable security controls. Availability impacts could result in denial of service for critical voice services, affecting customer support, emergency communications, and internal coordination. Given FortiVoice’s role in unified communications, the vulnerability could also serve as a pivot point for further network intrusion or lateral movement within an organization’s infrastructure. The medium severity rating suggests that while exploitation requires privileged access, the potential damage to confidentiality, integrity, and availability is substantial, warranting prompt remediation especially in sectors with high communication demands such as finance, healthcare, and government.

Mitigation Recommendations

1. Apply official patches or updates from Fortinet as soon as they become available to address CVE-2025-64156. 2. Restrict privileged access to FortiVoice management interfaces to a minimal set of trusted administrators, using strong authentication methods such as multi-factor authentication. 3. Implement network segmentation to isolate FortiVoice systems from general user networks and limit exposure to potential attackers. 4. Monitor FortiVoice logs and network traffic for unusual SQL queries or command execution attempts indicative of exploitation attempts. 5. Conduct regular security audits and vulnerability scans focusing on telephony infrastructure to detect misconfigurations or unauthorized changes. 6. Employ Web Application Firewalls (WAF) or intrusion prevention systems (IPS) with rules tailored to detect and block SQL injection patterns targeting FortiVoice. 7. Educate administrators on secure configuration practices and the risks of elevated privileges to reduce the attack surface. 8. Maintain up-to-date backups of FortiVoice configurations and data to enable rapid recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-10-28T12:26:50.750Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69385e4e74ebaa3baba142b5

Added to database: 12/9/2025, 5:37:18 PM

Last enriched: 1/14/2026, 2:50:36 PM

Last updated: 2/4/2026, 7:22:13 PM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats