CVE-2025-64156

7.2 HIGH

📋 TL;DR

This SQL injection vulnerability in Fortinet FortiVoice allows authenticated privileged attackers to execute unauthorized SQL commands via crafted requests. Affected versions include FortiVoice 7.2.0-7.2.2, 7.0.0-7.0.7, and all versions of 6.4 and 6.0. Attackers must have authenticated privileged access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Fortinet FortiVoice
Versions: 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4 all versions, 6.0 all versions
Operating Systems: FortiOS-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated privileged attacker access. All default configurations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary SQL commands, potentially leading to data exfiltration, privilege escalation, or full system takeover.

🟠

Likely Case

Unauthorized database access allowing data manipulation, extraction of sensitive information, or limited command execution within database context.

🟢

If Mitigated

Limited impact due to proper input validation and parameterized queries preventing SQL injection.

🌐 Internet-Facing: MEDIUM - Requires authenticated privileged access, but internet-facing interfaces could be targeted by attackers with stolen credentials.
🏢 Internal Only: HIGH - Internal attackers with privileged credentials can exploit this to gain unauthorized database access and potentially escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities are typically easy to exploit once discovered, but this requires authenticated privileged access which adds a barrier.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiVoice 7.2.3 and 7.0.8 or later

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-362

Restart Required: Yes

Instructions:

1. Download the latest firmware from Fortinet support portal. 2. Backup current configuration. 3. Upload and install the firmware update. 4. Reboot the system. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to FortiVoice management interfaces to only trusted administrative networks.

Privilege Reduction

all

Implement least privilege principle for FortiVoice user accounts and regularly audit privileged access.

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries at application layer if custom applications interact with FortiVoice
  • Deploy web application firewall (WAF) with SQL injection protection rules in front of FortiVoice interfaces

🔍 How to Verify

Check if Vulnerable:

Check FortiVoice firmware version via web GUI: System > Dashboard > System Information, or CLI: get system status

Check Version:

execute get system status | grep Version

Verify Fix Applied:

Verify firmware version is 7.2.3 or 7.0.8 or later, or check that affected versions are no longer installed

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed authentication attempts followed by successful privileged login
  • Unusual administrative activity from non-standard IP addresses

Network Indicators:

  • Unusual database connection patterns to FortiVoice
  • SQL injection payloads in HTTP requests to FortiVoice interfaces

SIEM Query:

source="fortivoice" AND (event_type="sql_error" OR http_request CONTAINS "' OR '1'='1" OR http_request CONTAINS "UNION SELECT")

🔗 References

📤 Share & Export