Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

CVE-2025-32756: Zero-Day Vulnerability in Multiple Fortinet Products Exploited in the Wild



Tenable Research Advisory Zero-Day Exploited Header Image

Fortinet has observed threat actors exploiting CVE-2025-32756, a critical zero-day arbitrary code execution vulnerability which affects multiple Fortinet products including FortiVoice, FortiMail, FortiNDR, FortiRecorder and FortiCamera.

Background

On May 13th, Fortinet published a security advisory (FG-IR-25-254) for CVE-2025-32756, a critical arbitrary code execution vulnerability affecting multiple Fortinet products.

CVEDescriptionCVSSv3
CVE-2025-32756An arbitrary code execution vulnerability in FortiVoice, FortiMail, FortiNDR, FortiRecorder and FortiCamera9.6

Analysis

CVE-2025-32756 is an arbitrary code execution vulnerability affecting multiple Fortinet products including FortiVoice, FortiMail, FortiNDR, FortiRecorder and FortiCamera. A remote unauthenticated attacker can send crafted HTTP requests in order to create a stack-based overflow condition which would allow for the execution of arbitrary code. This vulnerability was discovered by the Fortinet Product Security Team who observed threat activity involving a device running FortiVoice.

According to Fortinet, the threat actors operations included scanning the network, erasing system crashlogs and enabling ‘fcgi debugging’ which is used to log authentication attempts, including SSH logins. The ‘fcgi debugging’ option is not enabled by default and the Fortinet advisory recommends reviewing the setting as one possible indicator of compromise (IoC).

Historical Exploitation of Fortinet Devices

Fortinet vulnerabilities have historically been common targets for cyber attackers, and CVE-2025-32756 is the eighteenth Fortinet vulnerability to be added to the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) list.

CVEDescriptionPatchedTenable Blog
CVE-2024-55591Fortinet Authentication Bypass in FortiOS and FortiProxyJanuary 2025CVE-2024-55591: Fortinet Authentication Bypass Zero-Day Vulnerability Exploited in the Wild
CVE-2024-21762Fortinet FortiOS Out-of-bound Write Vulnerability in sslvpndFebruary 2024CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability
CVE-2023-27997FortiOS and FortiProxy Heap-Based Buffer Overflow VulnerabilityJune 2023CVE-2023-27997: Heap-Based Buffer Overflow in Fortinet FortiOS and FortiProxy SSL-VPN (XORtigate)
CVE-2022-42475FortiOS and FortiProxy Heap-Based Buffer Overflow VulnerabilityDecember 2022CVE-2022-42475: Fortinet Patches Zero Day in FortiOS SSL VPNsAA23-250A: Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475
CVE-2022-40684FortiOS and FortiProxy Authentication Bypass VulnerabilityOctober 2022CVE-2022-40684: Critical Authentication Bypass in FortiOS and FortiProxy

Proof of concept

At the time of writing this, no proof-of-concept (PoC) has been published for CVE-2025-32756. When a PoC is released, we expect attackers will incorporate this vulnerability in their attacks as Fortinet devices have been exploited by threat actors, including nation-state actors in the past.

Vendor response

Fortinet has provided a list of IoCs based on their observations of CVE-2025-32756. We recommend reviewing the list of IoCs and steps recommended by Fortinet to determine if your device may have been impacted.

Solution

The following table details the affected and fixed versions of Fortinet devices affected by CVE-2025-32756:

ProductAffected VersionFixed Version
FortiCamera 2.12.1.0 through 2.1.32.1.4 or above
FortiCamera 2.02.0 all versionsMigrate to a fixed release
FortiCamera 1.11.1 all versionsMigrate to a fixed release
FortiMail 7.67.6.0 through 7.6.27.6.3 or above
FortiMail 7.47.4.0 through 7.4.47.4.5 or above
FortiMail 7.27.2.0 through 7.2.77.2.8 or above
FortiMail 7.07.0.0 through 7.0.87.0.9 or above
FortiNDR 7.67.6.07.6.1 or above
FortiNDR 7.47.4.0 through 7.4.77.4.8 or above
FortiNDR 7.27.2.0 through 7.2.47.2.5 or above
FortiNDR 7.17.1 all versionsMigrate to a fixed release
FortiNDR 7.07.0.0 through 7.0.67.0.7 or above
FortiNDR 1.51.5 all versionsMigrate to a fixed release
FortiNDR 1.41.4 all versionsMigrate to a fixed release
FortiNDR 1.31.3 all versionsMigrate to a fixed release
FortiNDR 1.21.2 all versionsMigrate to a fixed release
FortiNDR 1.11.1 all versionsMigrate to a fixed release
FortiRecorder 7.27.2.0 through 7.2.37.2.4 or above
FortiRecorder 7.07.0.0 through 7.0.57.0.6 or above
FortiRecorder 6.46.4.0 through 6.4.56.4.6 or above
FortiVoice 7.27.2.07.2.1 or above
FortiVoice 7.07.0.0 through 7.0.67.0.7 or above
FortiVoice 6.46.4.0 through 6.4.106.4.11 or above

For users that are not able to immediately upgrade, Fortinet has provided a mitigation step; disabling the HTTP/HTTPS administrative interface. We recommend reviewing the Fortinet advisory for the latest information on workarounds and patched versions.

Identifying affected systems

A list of Tenable plugins for this vulnerability can be found on the individual CVE page for CVE-2025-32756 as they’re released. This link will display all available plugins for this vulnerability, including upcoming plugins in our Plugins Pipeline.

Additionally, customers can utilize Tenable Attack Surface Management to identify public facing assets running Fortinet devices by using the following subscription:

Tenable Attack Surface Management (ASM) Fortinet Subscription

Get more information

Join Tenable's Security Response Team on the Tenable Community.

Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.


Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.