CVE-2025-32756: A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiVoice versions 7.2.0, 7.0.0 through 7.0.6, 6.4.0 through 6.4.10,...

9.6 CVSS

Description

A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiVoice versions 7.2.0, 7.0.0 through 7.0.6, 6.4.0 through 6.4.10, FortiRecorder versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.5, 6.4.0 through 6.4.5, FortiMail versions 7.6.0 through 7.6.2, 7.4.0 through 7.4.4, 7.2.0 through 7.2.7, 7.0.0 through 7.0.8, FortiNDR versions 7.6.0, 7.4.0 through 7.4.7, 7.2.0 through 7.2.4, 7.0.0 through 7.0.6, FortiCamera versions 2.1.0 through 2.1.3, 2.0 all versions, 1.1 all versions, allows a remote unauthenticated attacker to execute arbitrary code or commands via sending HTTP requests with specially crafted hash cookie.

Known Exploited

🚨 Marked as known exploited on May 14th, 2025 (18 days ago).

Classification

CVE ID: CVE-2025-32756

CVSS Base Severity: CRITICAL

CVSS Base Score: 9.6

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C

Problem Types

Execute unauthorized code or commands

Affected Products

Vendor: Fortinet

Product: FortiVoice, FortiRecorder, FortiMail, FortiNDR, FortiCamera

Exploit Prediction Scoring System (EPSS)

EPSS Score: 8.83% (probability of being exploited)

EPSS Percentile: 92.06% (scored less or equal to compared to others)

EPSS Date: 2025-05-31 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-32756
https://fortiguard.fortinet.com/psirt/FG-IR-25-254

Timeline