Understand Every Side.
Published loading...Updated

Fortinet fixes critical zero-day exploited in FortiVoice attacks

  • On May 13, 2025, Fortinet announced a serious buffer overflow flaw in the stack memory, identified as CVE-2025-32756, which impacts several of its products, including FortiVoice.
  • Security researchers discovered the vulnerability after confirming active exploitation against FortiVoice systems through crafted HTTP requests by unauthenticated attackers.
  • Threat actors exploited this flaw to perform network scans, erase system crash logs, enable FCGI debugging for credential harvesting, and deploy malware on compromised devices.
  • The vulnerability, rated with a CVSS score of 9.6, impacts FortiVoice versions from 6.4.0 up to 6.4.10, FortiMail releases through 7.6.2, FortiNDR all 1.x versions and any 7.x editions earlier than 7.6.1, FortiRecorder versions up to 7.2.3, and FortiCamera versions up to 2.1.3. Multiple indicators of compromise have been identified, including six malicious IP addresses such as 198.105.127.124.
  • Fortinet released patches immediately and advised customers to update promptly or disable HTTP/HTTPS administrative interfaces as a temporary mitigation to prevent further exploitation.
Insights by Ground AI
Does this summary seem wrong?

10 Articles

All
Left
Center
1
Right
Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 100% of the sources are Center
100% Center
Factuality

To view factuality data please Upgrade to Premium

Ownership

To view ownership data please Upgrade to Vantage

Global Security Mag Online broke the news in on Tuesday, May 13, 2025.
Sources are mostly out of (0)

Similar News Topics