CVE-2025-47856

7.2 HIGH

📋 TL;DR

Two OS command injection vulnerabilities in Fortinet FortiVoice allow privileged attackers to execute arbitrary commands via crafted HTTP/HTTPS or CLI requests. This affects FortiVoice versions 7.2.0, 7.0.0 through 7.0.6, and versions before 6.4.10. Attackers with administrative access can gain full system control.

💻 Affected Systems

Products:
  • Fortinet FortiVoice
Versions: 7.2.0, 7.0.0 through 7.0.6, and versions before 6.4.10
Operating Systems: FortiOS-based appliance
Default Config Vulnerable: ⚠️ Yes
Notes: Requires privileged attacker access (administrative credentials). Both web interface (HTTP/HTTPS) and CLI are vulnerable vectors.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining root access, installing persistent backdoors, pivoting to other network systems, and exfiltrating sensitive data.

🟠

Likely Case

Privileged attacker executes commands to create administrative accounts, disable security controls, or deploy ransomware/cryptominers.

🟢

If Mitigated

Attack limited to command execution within application context if proper network segmentation and least privilege are enforced.

🌐 Internet-Facing: HIGH if FortiVoice web interface is exposed to internet, as authenticated attackers can exploit remotely.
🏢 Internal Only: HIGH as any privileged user (legitimate or compromised) can exploit from internal network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW for privileged attackers

Exploitation requires administrative credentials but is straightforward once authenticated. No public exploit code available at disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2.1, 7.0.7, 6.4.10

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-250

Restart Required: Yes

Instructions:

1. Backup configuration. 2. Download appropriate firmware from Fortinet support portal. 3. Upload firmware via web interface or CLI. 4. Reboot appliance. 5. Verify version after reboot.

🔧 Temporary Workarounds

Restrict administrative access

all

Limit administrative access to trusted IP addresses only using firewall rules.

config system interface
edit <interface>
set allowaccess https ssh
set trust-ip-1 <trusted_ip>
end

Enable multi-factor authentication

all

Require MFA for all administrative accounts to reduce credential compromise risk.

config user local
edit <admin_user>
set two-factor enable
set two-factor email/fortitoken
end

🧯 If You Can't Patch

  • Isolate FortiVoice appliance in separate VLAN with strict firewall rules allowing only necessary traffic.
  • Implement network segmentation and monitor for unusual administrative activity or command execution patterns.

🔍 How to Verify

Check if Vulnerable:

Check FortiVoice firmware version via web interface (System > Dashboard) or CLI command: get system status

Check Version:

get system status | grep Version

Verify Fix Applied:

Confirm version is 7.2.1, 7.0.7, or 6.4.10+ using: get system status

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative login patterns
  • CLI commands containing special characters or shell metacharacters
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from FortiVoice appliance
  • HTTP/HTTPS requests with command injection patterns to administrative endpoints

SIEM Query:

source="fortivoice" AND (event_type="admin_login" OR cmd="*;*" OR cmd="*|*" OR cmd="*`*" OR cmd="*$(*")

🔗 References

📤 Share & Export