Fortinet fixed two critical flaws in FortiFone and FortiSIEM
Fortinet修复了两个关键漏洞(CVE-2025-64155和CVE-2025-47855),分别影响FortiSIEM和FortiFone。这些漏洞允许未经认证的攻击者执行命令或泄露配置信息。修复版本已发布,建议用户升级以应对风险。 2026-1-14 15:7:44 Author: securityaffairs.com(查看原文) 阅读量:0 收藏

Fortinet fixed two critical flaws in FortiFone and FortiSIEM

Fortinet fixed six security flaws, including two critical bugs in FortiFone and FortiSIEM that attackers could exploit without authentication.

Fortinet released patches for six vulnerabilities, including two critical flaws in FortiFone and FortiSIEM that could be exploited without authentication to leak configuration data or enable code execution.

The first vulnerabilty, tracked as CVE-2025-64155 (CVSS score of 9.4), is an improper neutralization of special elements used in an OS command that could led to OS Command Injection. The vulnerability impacts FortiSIEM, an unauthenticated attacker can trigger the issue to execute unauthorized code or commands via crafted TCP requests.

“An improper neutralization of special elements used in an OS command (‘OS Command Injection’) vulnerability [CWE-78] in FortiSIEM may allow an unauthenticated attacker to execute unauthorized code or commands via crafted TCP requests.” reads the advisory.

The flaw impacts the following versions:

VersionAffectedSolution
FortiSIEM CloudNot affectedNot Applicable
FortiSIEM 7.5Not affectedNot Applicable
FortiSIEM 7.47.4.0Upgrade to 7.4.1 or above
FortiSIEM 7.37.3.0 through 7.3.4Upgrade to 7.3.5 or above
FortiSIEM 7.27.2.0 through 7.2.6Upgrade to 7.2.7 or above
FortiSIEM 7.17.1.0 through 7.1.8Upgrade to 7.1.9 or above
FortiSIEM 7.07.0.0 through 7.0.4Migrate to a fixed release
FortiSIEM 6.76.7.0 through 6.7.10Migrate to a fixed release

The researcher Zach Hanley (@hacks_zach) of Horizon3.ai reported the vulnerability.

The vulnerability only impacts the Super and Worker nodes, it does not impact Collector nodes. The vendor recommends limiting access to the phMonitor port (7900) as workaround.

The second critical flaw, tracked as CVE-2025-47855 (CVSS score of 9.3), addressed by Fortinet is an exposure of sensitive information to an unauthorized actor issue in FortiFone Web Portal page.

An unauthenticated attacker can trigger the flaw to obtain the device configuration via crafted HTTP or HTTPS requests.

“An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in FortiFone Web Portal page may allow an unauthenticated attacker to obtain the device configuration via crafted HTTP or HTTPS requests.” reads the advisory.

FortiFone versions 3.0.24 and 7.0.2 addressed the issue. The researcher Théo Leleu from Fortinet Product Security team reported the flaw.

It is unclear if one of the flaws addressed by Fortinet is actively exploited in attacks in the wild.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, FortiFone)




文章来源: https://securityaffairs.com/186902/security/fortinet-fixed-two-critical-flaws-in-fortifone-and-fortisiem.html
如有侵权请联系:admin#unsafe.sh