Skip to main content

CVE-2025-32756: FortiVoice Zero-Day Exploit Alert

Medium
Published: Wed May 14 2025 (05/14/2025, 13:56:14 UTC)
Source: AlienVault OTX

Description

A critical zero-day vulnerability (CVE-2025-32756) in multiple Fortinet products, including FortiVoice, has been actively exploited. The flaw is a stack-based buffer overflow that allows remote code execution without authentication. Attackers can gain full control of affected systems, access sensitive data, and pivot to other internal networks. The vulnerability stems from an enabled fcgi debugging option, which is not a default setting. Fortinet has released patches and recommends immediate action. Detection methods include checking for enabled fcgi debugging and monitoring specific log entries. The threat actor has been observed conducting network scans, deleting crash logs, and enabling FCGI debugging to capture credentials.

AI-Powered Analysis

AILast updated: 08/06/2025, 00:35:52 UTC

Technical Analysis

CVE-2025-32756 is a critical zero-day vulnerability affecting multiple Fortinet products, notably FortiVoice, FortiMail, FortiNDR, FortiRecorder, and FortiCamera. The vulnerability arises from a stack-based buffer overflow triggered by an enabled FastCGI (fcgi) debugging option, which is not enabled by default but can be activated by attackers. This flaw allows remote code execution (RCE) without requiring authentication or user interaction, enabling attackers to gain full control over vulnerable devices remotely. Exploitation involves sending specially crafted HTTP requests to the affected devices, leading to arbitrary code execution. Observed attacker behaviors include network scanning to identify vulnerable systems, deletion of crash logs to cover tracks, enabling FCGI debugging to capture credentials, and modification of system files, cron jobs, and configuration files to establish persistence. The ability to pivot internally after compromising a device significantly increases the threat to organizational networks. Detection methods focus on identifying enabled fcgi debugging and monitoring for suspicious log entries and network activity. Fortinet has released patches addressing this vulnerability and strongly recommends immediate patching or, as a temporary measure, disabling the HTTP/HTTPS administrative interfaces to prevent exploitation. The stealthy nature of the attack, including log manipulation and credential capture, combined with the lack of authentication requirements, makes this vulnerability highly dangerous and capable of causing widespread compromise in affected environments.

Potential Impact

For European organizations, the impact of CVE-2025-32756 is substantial due to the widespread deployment of Fortinet products in enterprise, government, and critical infrastructure sectors across Europe. Successful exploitation can lead to complete device compromise, unauthorized access to sensitive data, and lateral movement within internal networks, potentially affecting business continuity and data confidentiality. The ability to remotely execute code without authentication increases the risk of rapid and widespread exploitation. The attackers’ tactics of deleting logs and enabling debugging to capture credentials complicate incident detection and forensic analysis, potentially allowing prolonged undetected access. Sectors such as finance, healthcare, telecommunications, and government agencies are particularly at risk given their reliance on Fortinet devices for secure communications and network defense. Compromise of these devices could disrupt critical communications, expose sensitive information, and facilitate further attacks on organizational infrastructure. The stealth and persistence of the attack increase the risk of espionage and data exfiltration, posing significant operational and reputational risks to European organizations.

Mitigation Recommendations

European organizations should implement the following specific mitigation measures: 1) Conduct a thorough inventory of all Fortinet devices, especially FortiVoice, FortiMail, FortiNDR, FortiRecorder, and FortiCamera, to identify potentially affected versions. 2) Apply Fortinet’s official security patches immediately once available. If patches are not yet deployed, disable HTTP/HTTPS administrative interfaces on these devices to block remote exploitation vectors. 3) Enforce strict network segmentation to isolate Fortinet devices from untrusted networks and restrict administrative access to a limited set of trusted IP addresses. 4) Monitor network traffic for anomalous HTTP requests, network scanning activities, and connections to known malicious IP addresses associated with this campaign. 5) Regularly verify the integrity of system files, cron jobs, and configuration files to detect unauthorized modifications indicative of compromise. 6) Enhance logging and monitoring capabilities to detect attempts to erase logs or enable fcgi debugging, and configure alerts for suspicious administrative interface activity. 7) Implement multi-factor authentication (MFA) for all administrative access to reduce the risk of credential theft exploitation. 8) Train security teams on the specific tactics and indicators of this campaign to improve detection and incident response. 9) Maintain close coordination with Fortinet support and threat intelligence providers for timely updates and guidance on emerging threats related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://fortiguard.fortinet.com/psirt/FG-IR-25-254"]
Adversary

Indicators of Compromise

Cve

ValueDescriptionCopy
cveCVE-2025-32756

Hash

ValueDescriptionCopy
hash2c8834a52faee8d87cff7cd09c4fb946
hash364929c45703a84347064e2d5de45bcd
hash4410352e110f82eabc0bf160bec41d21
hash489821c38f429a21e1ea821f8460e590
hashebce43017d2cb316ea45e08374de7315

Ip

ValueDescriptionCopy
ip156.236.76.90
ip198.105.127.124
ip218.187.69.244
ip218.187.69.59
ip43.228.217.173
ip43.228.217.82

Threat ID: 682c992c7960f6956616a63c

Added to database: 5/20/2025, 3:01:00 PM

Last enriched: 8/6/2025, 12:35:52 AM

Last updated: 8/18/2025, 1:22:24 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats