Plattform
fortinet
Komponente
fortivoice
Behoben in
7.2.3
7.0.8
CVE-2025-60024 identifies a series of Path Traversal vulnerabilities within Fortinet FortiVoice, impacting versions 7.0.0 through 7.2.2. This flaw allows a privileged, authenticated attacker to write arbitrary files using specifically crafted HTTP or HTTPS commands. Successful exploitation could lead to unauthorized modifications of system files and potential compromise of the device. A patch is available from Fortinet to address this issue.
Successful exploitation of CVE-2025-60024 allows a privileged, authenticated attacker to write arbitrary files to the FortiVoice system. This could lead to a complete system takeover, allowing the attacker to modify configuration files, install malicious code, or exfiltrate sensitive data. The ability to write arbitrary files bypasses standard access controls, significantly expanding the potential attack surface. This vulnerability shares similarities with other path traversal exploits where attackers leverage predictable file system structures to gain unauthorized access and control.
CVE-2025-60024 was publicly disclosed on December 9, 2025. The vulnerability's impact is amplified by the requirement for only privileged authentication, making it accessible to users with elevated privileges within the FortiVoice environment. No public proof-of-concept exploits are currently known, but the path traversal nature of the vulnerability suggests a relatively low barrier to entry for exploitation. The vulnerability is not currently listed on the CISA KEV catalog.
Organizations utilizing FortiVoice devices, particularly those with legacy configurations or shared hosting environments, are at risk. Environments where privileged user accounts have broad write access to the system are especially vulnerable. Any deployment relying on FortiVoice for critical voice communication should prioritize patching.
• fortinet / server:
journalctl -u fortivvoice | grep -i "path traversal"• fortinet / server:
find /var/log/fortivvoice -type f -mtime -7 -name "*.log" | grep -i "path traversal"• generic web:
curl -I 'http://fortivoice/../../../../etc/passwd' # Example path traversal attemptdisclosure
Exploit-Status
EPSS
0.07% (22% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-60024 is to upgrade FortiVoice to a patched version. Fortinet has released updates to address this vulnerability; consult the official Fortinet advisory for the specific version. As a temporary workaround, restrict access to the vulnerable HTTP/HTTPS endpoints using a Web Application Firewall (WAF) or proxy server. Implement strict input validation on all user-supplied data to prevent malicious path manipulation. Regularly review FortiVoice configurations to ensure adherence to security best practices.
Actualice FortiVoice a una versión posterior a 7.0.7 o 7.2.2. Consulte el advisory de Fortinet para obtener más detalles e instrucciones específicas de actualización.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-60024 is a Path Traversal vulnerability affecting FortiVoice versions 7.0.0–7.2.2, allowing authenticated attackers to write arbitrary files, potentially compromising the device.
If you are running FortiVoice versions 7.0.0 through 7.2.2, you are potentially affected by this vulnerability. Check your version and upgrade as soon as possible.
Upgrade FortiVoice to a patched version provided by Fortinet. Refer to the official Fortinet security advisory for specific version details and upgrade instructions.
While no active exploitation campaigns have been confirmed, the vulnerability is publicly known, increasing the risk of future attacks. Continuous monitoring is recommended.
Refer to the official Fortinet security advisory on their website for detailed information, including affected versions and mitigation steps.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.