Overview
A critical SQL Injection vulnerability, identified as CVE-2025-58692, has been discovered in Fortinet FortiVoice. This vulnerability allows an authenticated attacker to execute unauthorized code or commands on affected systems. Organizations using vulnerable versions of FortiVoice are strongly advised to apply the necessary patches immediately.
Technical Details
CVE-2025-58692 is classified as an Improper Neutralization of Special Elements used in an SQL Command (“SQL Injection”) vulnerability [CWE-89]. The vulnerability exists in FortiVoice versions 7.2.0 through 7.2.2 and 7.0.0 through 7.0.7. An authenticated attacker can exploit this flaw by sending specifically crafted HTTP or HTTPS requests that inject malicious SQL code into the system. This can lead to unauthorized data access, modification, or even complete system compromise.
CVSS Analysis
The Common Vulnerability Scoring System (CVSS) provides a standardized way to assess the severity of vulnerabilities. CVE-2025-58692 has been assigned a CVSS score of 8.8, indicating a HIGH severity. This score reflects the potential for significant impact, given the ability of an attacker to execute arbitrary code and commands.
Possible Impact
Successful exploitation of CVE-2025-58692 can have severe consequences, including:
- Data Breach: Unauthorized access to sensitive data stored in the FortiVoice database.
- System Compromise: Execution of arbitrary commands, potentially leading to complete system takeover.
- Denial of Service: Disruption of FortiVoice services, impacting communication capabilities.
- Reputational Damage: Loss of trust and confidence from customers and partners.
Mitigation and Patch Steps
Fortinet has released patches to address this vulnerability. Organizations using affected versions of FortiVoice should take the following steps:
- Identify Vulnerable Systems: Determine which FortiVoice systems are running versions 7.2.0-7.2.2 or 7.0.0-7.0.7.
- Apply the Patch: Upgrade to a patched version of FortiVoice as soon as possible. Refer to the Fortinet advisory (linked below) for specific upgrade instructions.
- Monitor for Suspicious Activity: Implement security monitoring to detect any signs of exploitation attempts.
- Review Access Controls: Ensure that access to FortiVoice is properly restricted and that strong passwords are in use.
