PT-2025-20903 · Fortinet · Fortivoice +4
Published
2025-05-13
·
Updated
2025-07-17
·
CVE-2025-32756
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
FortiVoice versions 7.2.0, 7.0.0 through 7.0.6, 6.4.0 through 6.4.10
FortiRecorder versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.5, 6.4.0 through 6.4.5
FortiMail versions 7.6.0 through 7.6.2, 7.4.0 through 7.4.4, 7.2.0 through 7.2.7, 7.0.0 through 7.0.8
FortiNDR versions 7.6.0, 7.4.0 through 7.4.7, 7.2.0 through 7.2.4, 7.0.0 through 7.0.6
FortiCamera versions 2.1.0 through 2.1.3, 2.0 all versions, 1.1 all versions
Description:
A stack-based buffer overflow vulnerability in Fortinet products allows a remote unauthenticated attacker to execute arbitrary code or commands via sending HTTP requests with specially crafted hash cookies. The vulnerability is being actively exploited in the wild, and it affects multiple Fortinet products, including FortiVoice, FortiMail, FortiNDR, FortiRecorder, and FortiCamera. The estimated number of potentially affected devices worldwide is not specified. Threat actors are exploiting this vulnerability to execute arbitrary code, scan networks, steal credentials, and wipe crash logs.
Recommendations:
For each affected version, apply the security updates released by Fortinet to patch the critical remote code execution vulnerability.
As a temporary workaround, consider disabling the HTTP admin interface until a patch is available.
Restrict access to the vulnerable modules to minimize the risk of exploitation.
Avoid using the `AuthHash` cookie in the affected API endpoints until the issue is resolved.
Exploit
Fix
RCE
Stack Overflow
Memory Corruption
Related Identifiers
Affected Products
References · 255
- 🔥 https://github.com/kn0x0x/CVE-2025-32756-POC⭐ 12 🔗 6 · Exploit
- https://bdu.fstec.ru/vul/2025-05439 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-32756 · Security Note
- https://fortiguard.fortinet.com/psirt/FG-IR-25-254 · Security Note, Vendor Advisory
- https://twitter.com/CyberHub_blog/status/1923433810508595550 · Twitter Post
- https://twitter.com/f1tym1/status/1922744894398840927 · Twitter Post
- https://twitter.com/Horizon3ai/status/1925951106888134932 · Twitter Post
- https://twitter.com/socradar/status/1922619149240660195 · Twitter Post
- https://twitter.com/iotsecpulse/status/1936457351843975633 · Twitter Post
- https://twitter.com/Dinosn/status/1926148846259667199 · Twitter Post
- https://twitter.com/TheCyberSecHub/status/1922521898573037641 · Twitter Post
- https://t.me/c/1323455529/2105 · Telegram Post
- https://twitter.com/fofabot/status/1927187953530318865 · Twitter Post
- https://twitter.com/cyberetweet/status/1922521413845438664 · Twitter Post
- https://cybersecuritynews.com/fortinet-0-day-vulnerability-poc · Reddit Post