Patch Watch · Exploits

Fortinet Patches Critical FortiVoice Zero-Day Exploited for Credential Theft and Network Scanning

FortiVoice CVE-2025-32756 zero-day RCE credential theft and network scanning diagram
SH
Samir Haddad
Vulnerability analyst · Updated May 15, 2026, 3:29 PM EDT

Fortinet patched CVE-2025-32756, a critical unauthenticated RCE flaw exploited against FortiVoice systems for credential theft, FastCGI debugging and network scanning.

Fortinet has patched CVE-2025-32756, a critical remote code execution vulnerability exploited in the wild against FortiVoice systems, warning that the same flaw also affects FortiMail, FortiNDR, FortiRecorder and FortiCamera products.

The bug is a stack-based buffer overflow that allows a remote, unauthenticated attacker to execute arbitrary code or commands by sending crafted HTTP requests to portal or administrative interfaces. The vulnerability carries a CVSS 9.8 Critical rating and requires no user interaction, no prior access and only network reachability to exploit.

Fortinet disclosed the flaw on May 13, 2025, and said it had observed real-world exploitation against FortiVoice appliances. The U.S. cyber defense agency added the vulnerability to its catalog of known exploited vulnerabilities on May 14, setting a June 4, 2025 remediation deadline for covered federal agencies.

The confirmed exploitation makes this more than a routine patch advisory. Fortinet said the observed attacker activity included scanning the device network, erasing system crash logs and enabling FastCGI debugging to capture credentials from system or SSH login attempts. The company also published file, log and IP indicators tied to the activity.

The vulnerability affects enterprise systems that often sit close to sensitive communications, email, detection, recording or camera infrastructure. FortiVoice is used for unified communications functions such as calling and conferencing, while FortiMail and FortiNDR can occupy high-value positions in enterprise environments. A successful compromise could give attackers a foothold on appliances that defenders may not monitor as closely as traditional servers or endpoints.

The immediate fix is to upgrade affected systems to fixed versions. Fortinet also advises disabling the HTTP/HTTPS administrative and portal interface if patching cannot be completed immediately.

ProductAffected versionsFixed version or action
FortiVoice 7.27.2.0Upgrade to 7.2.1+
FortiVoice 7.07.0.0-7.0.6Upgrade to 7.0.7+
FortiVoice 6.46.4.0-6.4.10Upgrade to 6.4.11+
FortiMail 7.67.6.0-7.6.2Upgrade to 7.6.3+
FortiMail 7.47.4.0-7.4.4Upgrade to 7.4.5+
FortiMail 7.27.2.0-7.2.7Upgrade to 7.2.8+
FortiMail 7.07.0.0-7.0.8Upgrade to 7.0.9+
FortiNDR 7.67.6.0Upgrade to 7.6.1+
FortiNDR 7.47.4.0-7.4.7Upgrade to 7.4.8+
FortiNDR 7.27.2.0-7.2.4Upgrade to 7.2.5+
FortiNDR 7.07.0.0-7.0.6Upgrade to 7.0.7+
FortiRecorder 7.27.2.0-7.2.3Upgrade to 7.2.4+
FortiRecorder 7.07.0.0-7.0.5Upgrade to 7.0.6+
FortiRecorder 6.46.4.0-6.4.5Upgrade to 6.4.6+
FortiCamera 2.12.1.0-2.1.3Upgrade to 2.1.4+
FortiCamera 2.0 / 1.1All versionsMigrate to a fixed release

The technical trigger involves HTTP requests containing a specially crafted hash cookie. Independent reverse engineering of patched and unpatched Fortinet builds points to cookie parsing around an APSCOOKIE value containing fields such as Era, Payload and AuthHash. The vulnerable code path appears to decode attacker-controlled AuthHash data into a fixed-size stack buffer, while the patched version adds a length check.

That finding aligns with the severity rating: a network-reachable, unauthenticated memory corruption bug in an administrative interface gives attackers a direct path to code execution if exposed systems remain unpatched.

Fortinet's indicators suggest attackers were not merely testing the bug. The observed activity included persistence- and credential-oriented behavior, including modifications to SSH-related configuration and the addition of files used to collect credentials.

Notable file and path indicators include:

IndicatorSignificance
/bin/wpad_ac_helperMain malware file reported in observed activity
/lib/libfmlogin.soMalicious library used to log SSH usernames and passwords
/tmp/.sshdpmFile containing credentials gathered by the malicious SSH component
/bin/fmtestScript used for network scanning
/var/spool/.syncOutput location for collected credentials
/etc/pam.d/sshdModified to load the malicious login-related library
/etc/httpd.confModified to load a SOCKS-related module
/data/etc/crontabModified to collect sensitive FastCGI debug data

Administrators can check whether FastCGI debugging has been enabled with:

diag debug application fcgi

If the output shows general to-file ENABLED, Fortinet says that is not a default setting and may indicate compromise unless the organization intentionally enabled it.

Fortinet also reported the following IP addresses in connection with the observed activity:

198.105.127.124
43.228.217.173
43.228.217.82
156.236.76.90
218.187.69.244
218.187.69.59

Those addresses should be treated as threat-hunting leads, not as a complete map of attacker infrastructure. Organizations should correlate them with logs, appliance telemetry and local context before making blocking or incident-response decisions.

The key caveat is scope. Exploitation has been confirmed against FortiVoice, while the underlying vulnerability affects several other Fortinet product families. Publicly available information does not establish that FortiMail, FortiNDR, FortiRecorder or FortiCamera systems have also been exploited in the wild.

No public attribution has been made to a named threat actor, and ransomware use is listed as unknown. There is also no reliable public victim count.

For defenders, the priority is straightforward: identify internet-exposed Fortinet systems, patch affected versions, disable exposed administrative and portal interfaces where immediate upgrades are not possible, and hunt for the published log, file and configuration indicators. The combination of unauthenticated remote code execution, confirmed exploitation and credential collection makes CVE-2025-32756 an urgent edge-appliance vulnerability rather than a low-risk maintenance item.

Sources