National Cyber Warfare Foundation (NCWF)

Fortinet fixed two critical flaws in FortiFone and FortiSIEM


0 user ratings
2026-01-14 16:07:43
milo
Blue Team (CND)
Fortinet fixed six security flaws, including two critical bugs in FortiFone and FortiSIEM that attackers could exploit without authentication. Fortinet released patches for six vulnerabilities, including two critical flaws in FortiFone and FortiSIEM that could be exploited without authentication to leak configuration data or enable code execution. The first vulnerabilty, tracked as CVE-2025-64155 (CVSS score […


Fortinet fixed six security flaws, including two critical bugs in FortiFone and FortiSIEM that attackers could exploit without authentication.





Fortinet released patches for six vulnerabilities, including two critical flaws in FortiFone and FortiSIEM that could be exploited without authentication to leak configuration data or enable code execution.





The first vulnerabilty, tracked as CVE-2025-64155 (CVSS score of 9.4), is an improper neutralization of special elements used in an OS command that could led to OS Command Injection. The vulnerability impacts FortiSIEM, an unauthenticated attacker can trigger the issue to execute unauthorized code or commands via crafted TCP requests.





“An improper neutralization of special elements used in an OS command (‘OS Command Injection’) vulnerability [CWE-78] in FortiSIEM may allow an unauthenticated attacker to execute unauthorized code or commands via crafted TCP requests.” reads the advisory.





The flaw impacts the following versions:





VersionAffectedSolution
FortiSIEM CloudNot affectedNot Applicable
FortiSIEM 7.5Not affectedNot Applicable
FortiSIEM 7.47.4.0Upgrade to 7.4.1 or above
FortiSIEM 7.37.3.0 through 7.3.4Upgrade to 7.3.5 or above
FortiSIEM 7.27.2.0 through 7.2.6Upgrade to 7.2.7 or above
FortiSIEM 7.17.1.0 through 7.1.8Upgrade to 7.1.9 or above
FortiSIEM 7.07.0.0 through 7.0.4Migrate to a fixed release
FortiSIEM 6.76.7.0 through 6.7.10Migrate to a fixed release




The researcher Zach Hanley (@hacks_zach) of Horizon3.ai reported the vulnerability.





The vulnerability only impacts the Super and Worker nodes, it does not impact Collector nodes. The vendor recommends limiting access to the phMonitor port (7900) as workaround.





The second critical flaw, tracked as CVE-2025-47855 (CVSS score of 9.3), addressed by Fortinet is an exposure of sensitive information to an unauthorized actor issue in FortiFone Web Portal page.





An unauthenticated attacker can trigger the flaw to obtain the device configuration via crafted HTTP or HTTPS requests.





“An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in FortiFone Web Portal page may allow an unauthenticated attacker to obtain the device configuration via crafted HTTP or HTTPS requests.” reads the advisory.





FortiFone versions 3.0.24 and 7.0.2 addressed the issue. The researcher Théo Leleu from Fortinet Product Security team reported the flaw.





It is unclear if one of the flaws addressed by Fortinet is actively exploited in attacks in the wild.





Follow me on Twitter: @securityaffairs and Facebook and Mastodon





Pierluigi Paganini





(SecurityAffairs – hacking, FortiFone)



Source: SecurityAffairs
Source Link: https://securityaffairs.com/186902/uncategorized/fortinet-fixed-two-critical-flaws-in-fortifone-and-fortisiem.html


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Blue Team (CND)



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.