Platform
fortinet
Component
fortivoice
Fixed in
7.2.3
7.0.8
CVE-2025-60024 identifies a series of Path Traversal vulnerabilities within Fortinet FortiVoice, impacting versions 7.0.0 through 7.2.2. This flaw allows a privileged, authenticated attacker to write arbitrary files using specifically crafted HTTP or HTTPS commands. Successful exploitation could lead to unauthorized modifications of system files and potential compromise of the device. A patch is available from Fortinet to address this issue.
The Path Traversal vulnerability in FortiVoice allows an attacker who has already gained authenticated access to the system to write files to arbitrary locations. This is a significant risk because it bypasses intended access controls. An attacker could overwrite critical configuration files, inject malicious scripts, or even place backdoors, effectively taking control of the FortiVoice device. The potential blast radius extends beyond the device itself, as compromised voice systems can be used as entry points to the broader network. This vulnerability shares similarities with other path traversal exploits where attackers leverage predictable file system structures to gain unauthorized access.
CVE-2025-60024 was publicly disclosed on December 9, 2025. The vulnerability's severity is rated HIGH with a CVSS score of 7.7. Currently, there are no publicly available Proof-of-Concept (PoC) exploits. It is not listed on the CISA KEV catalog as of this writing, but its potential impact warrants close monitoring. Active exploitation campaigns are not currently confirmed, but the availability of the vulnerability details increases the likelihood of future attacks.
Exploit Status
EPSS
0.07% (22% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2025-60024 is to upgrade FortiVoice to a patched version. Fortinet has released updates to address this vulnerability; refer to their security advisory for specific version details. If immediate patching is not feasible, consider implementing strict access controls to limit the number of authenticated users with write access. Web Application Firewalls (WAFs) can be configured with rules to block requests containing suspicious path manipulation attempts. Monitor FortiVoice system logs for unusual file creation or modification activity.
Update FortiVoice to a version later than 7.0.7 or 7.2.2. See the Fortinet advisory for more details and specific upgrade instructions.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2025-60024 is a Path Traversal vulnerability affecting FortiVoice versions 7.0.0–7.2.2, allowing authenticated attackers to write arbitrary files, potentially compromising the device.
If you are running FortiVoice versions 7.0.0 through 7.2.2, you are potentially affected by this vulnerability. Check your version and upgrade as soon as possible.
Upgrade FortiVoice to a patched version provided by Fortinet. Refer to the official Fortinet security advisory for specific version details and upgrade instructions.
While no active exploitation campaigns have been confirmed, the vulnerability is publicly known, increasing the risk of future attacks. Continuous monitoring is recommended.
Refer to the official Fortinet security advisory on their website for detailed information, including affected versions and mitigation steps.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.