CVE-2025-32756 (GCVE-0-2025-32756)
Vulnerability from cvelistv5 – Published: 2025-05-13 14:46 – Updated: 2026-01-15 12:54
VLAI?
CISA KEV
Summary
A stack-based buffer overflow vulnerability [CWE-121] vulnerability in Fortinet FortiCamera 2.1.0 through 2.1.3, FortiCamera 2.0 all versions, FortiCamera 1.1 all versions, FortiMail 7.6.0 through 7.6.2, FortiMail 7.4.0 through 7.4.4, FortiMail 7.2.0 through 7.2.7, FortiMail 7.0.0 through 7.0.8, FortiNDR 7.6.0, FortiNDR 7.4.0 through 7.4.7, FortiNDR 7.2.0 through 7.2.4, FortiNDR 7.0.0 through 7.0.6, FortiRecorder 7.2.0 through 7.2.3, FortiRecorder 7.0.0 through 7.0.5, FortiRecorder 6.4.0 through 6.4.5, FortiVoice 7.2.0, FortiVoice 7.0.0 through 7.0.6, FortiVoice 6.4.0 through 6.4.10 allows a remote unauthenticated attacker to execute arbitrary code or commands via sending HTTP requests with specially crafted hash cookie.
Severity ?
9.6 (Critical)
CWE
- CWE-121 - Execute unauthorized code or commands
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Fortinet | FortiNDR |
Affected:
7.6.0
Affected: 7.4.0 , ≤ 7.4.7 (semver) Affected: 7.2.0 , ≤ 7.2.4 (semver) Affected: 7.1.0 , ≤ 7.1.1 (semver) Affected: 7.0.0 , ≤ 7.0.6 (semver) Affected: 1.5.0 , ≤ 1.5.3 (semver) Affected: 1.4.0 Affected: 1.3.0 , ≤ 1.3.1 (semver) Affected: 1.2.0 Affected: 1.1.0 cpe:2.3:a:fortinet:fortindr:7.6.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.4.7:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.4.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.4.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.4.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.4.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.2.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.2.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.2.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.2.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.1.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.1.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:1.5.3:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:1.5.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:1.5.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:1.5.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:1.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:1.3.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:1.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:1.2.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortindr:1.1.0:*:*:*:*:*:*:* |
||||||||||||||||||||||
|
||||||||||||||||||||||||
CISA KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant
KEV entry ID: 3fa02802-664b-497d-b95f-d19e329f4a0f
Exploited: Yes
Timestamps
First Seen: 2025-05-14
Asserted: 2025-05-14
Scope
Notes: KEV entry: Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability | Affected: Fortinet / Multiple Products | Description: Fortinet FortiFone, FortiVoice, FortiNDR and FortiMail contain a stack-based overflow vulnerability that may allow a remote unauthenticated attacker to execute arbitrary code or commands via crafted HTTP requests. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2025-06-04 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://fortiguard.fortinet.com/psirt/FG-IR-25-254 ; https://nvd.nist.gov/vuln/detail/CVE-2025-32756
Evidence
Type: Vendor Report
Signal: Successful Exploitation
Confidence: 80%
Source: cisa-kev
Details
| Cwes | CWE-124 |
|---|---|
| Feed | CISA Known Exploited Vulnerabilities Catalog |
| Product | Multiple Products |
| Due Date | 2025-06-04 |
| Date Added | 2025-05-14 |
| Vendorproject | Fortinet |
| Vulnerabilityname | Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability |
| Knownransomwarecampaignuse | Unknown |
References
Created: 2026-02-02 12:26 UTC
| Updated: 2026-02-02 12:26 UTC
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-32756",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-15T04:01:18.017087Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2025-05-14",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32756"
},
"type": "kev"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T22:55:16.319Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32756"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-05-14T00:00:00+00:00",
"value": "CVE-2025-32756 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:fortinet:fortindr:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortindr:1.1.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "FortiNDR",
"vendor": "Fortinet",
"versions": [
{
"status": "affected",
"version": "7.6.0"
},
{
"lessThanOrEqual": "7.4.7",
"status": "affected",
"version": "7.4.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.2.4",
"status": "affected",
"version": "7.2.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.1.1",
"status": "affected",
"version": "7.1.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.0.6",
"status": "affected",
"version": "7.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "1.5.3",
"status": "affected",
"version": "1.5.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "1.4.0"
},
{
"lessThanOrEqual": "1.3.1",
"status": "affected",
"version": "1.3.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "1.2.0"
},
{
"status": "affected",
"version": "1.1.0"
}
]
},
{
"cpes": [
"cpe:2.3:a:fortinet:forticamera:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticamera:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticamera:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticamera:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticamera:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticamera:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticamera:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticamera:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticamera:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticamera:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:forticamera:1.1.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "FortiCamera",
"vendor": "Fortinet",
"versions": [
{
"lessThanOrEqual": "2.1.3",
"status": "affected",
"version": "2.1.0",
"versionType": "semver"
},
{
"status": "affected",
"version": "2.0.0"
},
{
"lessThanOrEqual": "1.1.5",
"status": "affected",
"version": "1.1.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:fortinet:fortirecorder:7.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:6.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:6.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortirecorder:6.4.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "FortiRecorder",
"vendor": "Fortinet",
"versions": [
{
"lessThanOrEqual": "7.2.3",
"status": "affected",
"version": "7.2.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.0.5",
"status": "affected",
"version": "7.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.4.5",
"status": "affected",
"version": "6.4.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:fortinet:fortivoice:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortivoice:6.4.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "FortiVoice",
"vendor": "Fortinet",
"versions": [
{
"status": "affected",
"version": "7.2.0"
},
{
"lessThanOrEqual": "7.0.6",
"status": "affected",
"version": "7.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.4.10",
"status": "affected",
"version": "6.4.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:fortinet:fortimail:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimail:7.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "FortiMail",
"vendor": "Fortinet",
"versions": [
{
"lessThanOrEqual": "7.6.2",
"status": "affected",
"version": "7.6.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.4.4",
"status": "affected",
"version": "7.4.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.2.7",
"status": "affected",
"version": "7.2.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.0.8",
"status": "affected",
"version": "7.0.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A stack-based buffer overflow vulnerability [CWE-121] vulnerability in Fortinet FortiCamera 2.1.0 through 2.1.3, FortiCamera 2.0 all versions, FortiCamera 1.1 all versions, FortiMail 7.6.0 through 7.6.2, FortiMail 7.4.0 through 7.4.4, FortiMail 7.2.0 through 7.2.7, FortiMail 7.0.0 through 7.0.8, FortiNDR 7.6.0, FortiNDR 7.4.0 through 7.4.7, FortiNDR 7.2.0 through 7.2.4, FortiNDR 7.0.0 through 7.0.6, FortiRecorder 7.2.0 through 7.2.3, FortiRecorder 7.0.0 through 7.0.5, FortiRecorder 6.4.0 through 6.4.5, FortiVoice 7.2.0, FortiVoice 7.0.0 through 7.0.6, FortiVoice 6.4.0 through 6.4.10 allows a remote unauthenticated attacker to execute arbitrary code or commands via sending HTTP requests with specially crafted hash cookie."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "Execute unauthorized code or commands",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-15T12:54:22.845Z",
"orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
"shortName": "fortinet"
},
"references": [
{
"name": "https://fortiguard.fortinet.com/psirt/FG-IR-25-254",
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-25-254"
}
],
"solutions": [
{
"lang": "en",
"value": "Upgrade to FortiNDR version 7.6.1 or above\nUpgrade to FortiNDR version 7.4.8 or above\nUpgrade to FortiNDR version 7.2.5 or above\nUpgrade to FortiNDR version 7.0.7 or above\nUpgrade to FortiCamera version 2.1.4 or above\nUpgrade to FortiRecorder version 7.2.4 or above\nUpgrade to FortiRecorder version 7.0.6 or above\nUpgrade to FortiRecorder version 6.4.6 or above\nUpgrade to FortiVoice version 7.2.1 or above\nUpgrade to FortiVoice version 7.0.7 or above\nUpgrade to FortiVoice version 6.4.11 or above\nUpgrade to FortiMail version 7.6.3 or above\nUpgrade to FortiMail version 7.4.5 or above\nUpgrade to FortiMail version 7.2.8 or above\nUpgrade to FortiMail version 7.0.9 or above"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
"assignerShortName": "fortinet",
"cveId": "CVE-2025-32756",
"datePublished": "2025-05-13T14:46:44.208Z",
"dateReserved": "2025-04-10T08:12:12.347Z",
"dateUpdated": "2026-01-15T12:54:22.845Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2025-32756",
"cwes": "[\"CWE-124\"]",
"dateAdded": "2025-05-14",
"dueDate": "2025-06-04",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://fortiguard.fortinet.com/psirt/FG-IR-25-254 ; https://nvd.nist.gov/vuln/detail/CVE-2025-32756",
"product": "Multiple Products",
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"shortDescription": "Fortinet FortiFone, FortiVoice, FortiNDR and FortiMail contain a stack-based overflow vulnerability that may allow a remote unauthenticated attacker to execute arbitrary code or commands via crafted HTTP requests.",
"vendorProject": "Fortinet",
"vulnerabilityName": "Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-32756\",\"sourceIdentifier\":\"psirt@fortinet.com\",\"published\":\"2025-05-13T15:15:57.113\",\"lastModified\":\"2026-01-14T19:18:55.170\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A stack-based buffer overflow vulnerability [CWE-121] vulnerability in Fortinet FortiCamera 2.1.0 through 2.1.3, FortiCamera 2.0 all versions, FortiCamera 1.1 all versions, FortiMail 7.6.0 through 7.6.2, FortiMail 7.4.0 through 7.4.4, FortiMail 7.2.0 through 7.2.7, FortiMail 7.0.0 through 7.0.8, FortiNDR 7.6.0, FortiNDR 7.4.0 through 7.4.7, FortiNDR 7.2.0 through 7.2.4, FortiNDR 7.0.0 through 7.0.6, FortiRecorder 7.2.0 through 7.2.3, FortiRecorder 7.0.0 through 7.0.5, FortiRecorder 6.4.0 through 6.4.5, FortiVoice 7.2.0, FortiVoice 7.0.0 through 7.0.6, FortiVoice 6.4.0 through 6.4.10 allows a remote unauthenticated attacker to execute arbitrary code or commands via sending HTTP requests with specially crafted hash cookie.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de desbordamiento de b\u00fafer basada en pila [CWE-121] en Fortinet FortiVoice versiones 7.2.0, 7.0.0 a 7.0.6, 6.4.0 a 6.4.10, FortiRecorder versiones 7.2.0 a 7.2.3, 7.0.0 a 7.0.5, 6.4.0 a 6.4.5, FortiMail versiones 7.6.0 a 7.6.2, 7.4.0 a 7.4.4, 7.2.0 a 7.2.7, 7.0.0 a 7.0.8, FortiNDR versiones 7.6.0, 7.4.0 a 7.4.7, 7.2.0 a 7.2.4, 7.0.0 a 7.0.6, FortiCamera versiones 2.1.0 a 2.1.1, 2.1.2 a 2.1.3, 2.1.4 a 2.1.5, 2.1.6 a 2.1.7, 2.1.8 a 2.1.9, 2.1.1 a 2.1.19, 2.1.9 a 2.1.19, 2.1.1 a 2.1.29, 2.1.3 a 2.1.49, 2.1.4 a 2.1.59, 2.1.6 a 2.1.79, 2.1.8 a 2.1.89, 2.1.9 a 2.1.99, 2.1.9 a 2.1.19, 2.1.9 a 2.1.2 ... 2.1.3, 2.0 todas las versiones, 1.1 todas las versiones, permite a un atacante remoto no autenticado ejecutar c\u00f3digo o comandos arbitrarios mediante el env\u00edo de solicitudes HTTP con cookies hash especialmente manipuladas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@fortinet.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"cisaExploitAdd\":\"2025-05-14\",\"cisaActionDue\":\"2025-06-04\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"Fortinet Multiple Products Stack-Based Buffer Overflow Vulnerability\",\"weaknesses\":[{\"source\":\"psirt@fortinet.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndExcluding\":\"7.0.9\",\"matchCriteriaId\":\"F05ACB93-42BC-43CD-845F-35FA9FE1D92D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndExcluding\":\"7.2.8\",\"matchCriteriaId\":\"8395970D-F937-4D1C-9FE1-90348F33FA94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.4.0\",\"versionEndExcluding\":\"7.4.5\",\"matchCriteriaId\":\"3A40DE6A-D852-4B7E-BA67-B5DBBB3D427C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.6.0\",\"versionEndExcluding\":\"7.6.3\",\"matchCriteriaId\":\"F2F1655C-A21F-4FD3-875C-4E1DD8A7E178\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortindr:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndExcluding\":\"7.0.7\",\"matchCriteriaId\":\"039768AE-7C53-48E2-ADEE-77AE304B3D36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortindr:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndExcluding\":\"7.2.5\",\"matchCriteriaId\":\"25383BFB-4CBE-4577-8AB7-4259D03B5B6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortindr:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.4.0\",\"versionEndExcluding\":\"7.4.8\",\"matchCriteriaId\":\"68F2B9B7-29FE-4CDD-8638-33CA947AB466\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortindr:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A64D6DA-FC2D-4411-9ADF-7103C0EA652E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortindr:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90B58E2B-7304-49FB-9454-ED9FFBCEE697\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortindr:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C0A1B68-65DC-4267-939A-216758809DC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortindr:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF813322-7AF8-4F9C-82D9-DBEF8888B97B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortindr:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DD4A5F-260B-446D-8891-069A34D31760\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortindr:7.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"888692FD-3219-49D3-898C-F4EA84CCC6CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortindr:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"874D4928-620B-42FE-8B19-C4314C46739A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortindr:7.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A1D8AE9-D9F9-402C-B8EB-58189200E0D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortirecorder:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.4.0\",\"versionEndExcluding\":\"6.4.6\",\"matchCriteriaId\":\"A54116E5-DAA0-4D49-A2EE-FA9F9DF0D003\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortirecorder:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndExcluding\":\"7.0.6\",\"matchCriteriaId\":\"EF6B0F6E-6044-4F62-8AB5-A832A0554B9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortirecorder:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndExcluding\":\"7.2.4\",\"matchCriteriaId\":\"55A5E420-BCAF-4399-9223-A4398760CD87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.4.0\",\"versionEndExcluding\":\"6.4.11\",\"matchCriteriaId\":\"408D5EE5-B951-4022-A4DF-0295A04899E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndExcluding\":\"7.0.7\",\"matchCriteriaId\":\"58472BB4-2426-44B5-8D17-9C984EA567EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortivoice:7.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76B48D4B-338A-4CEB-8712-6D880FF0F034\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fortinet:forticamera_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0.0\",\"versionEndIncluding\":\"2.1.3\",\"matchCriteriaId\":\"6DBA20DC-B0EE-4FB7-9607-99EDFC4AA459\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fortinet:forticamera:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB863FD-5593-4620-8740-4EB692EA58E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fortinet:forticamera_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1.0\",\"versionEndIncluding\":\"1.1.5\",\"matchCriteriaId\":\"A5FD90AB-29F2-40F1-8591-D046850906F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fortinet:forticamera:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB863FD-5593-4620-8740-4EB692EA58E1\"}]}]}],\"references\":[{\"url\":\"https://fortiguard.fortinet.com/psirt/FG-IR-25-254\",\"source\":\"psirt@fortinet.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32756\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-32756\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-15T04:01:18.017087Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2025-05-14\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32756\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-05-14T00:00:00+00:00\", \"value\": \"CVE-2025-32756 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-32756\", \"tags\": [\"government-resource\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-13T15:15:36.229Z\"}}], \"cna\": {\"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:fortinet:fortindr:7.6.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.4.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.4.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.4.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.4.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.4.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.4.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.4.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.4.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.2.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.2.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.2.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.2.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.2.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.1.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.1.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.0.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.0.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.0.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.0.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.0.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.0.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:7.0.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:1.5.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:1.5.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:1.5.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:1.5.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:1.4.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:1.3.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:1.3.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:1.2.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortindr:1.1.0:*:*:*:*:*:*:*\"], \"vendor\": \"Fortinet\", \"product\": \"FortiNDR\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.6.0\"}, {\"status\": \"affected\", \"version\": \"7.4.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.4.7\"}, {\"status\": \"affected\", \"version\": \"7.2.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.2.4\"}, {\"status\": \"affected\", \"version\": \"7.1.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.1.1\"}, {\"status\": \"affected\", \"version\": \"7.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.0.6\"}, {\"status\": \"affected\", \"version\": \"1.5.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"1.5.3\"}, {\"status\": \"affected\", \"version\": \"1.4.0\"}, {\"status\": \"affected\", \"version\": \"1.3.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"1.3.1\"}, {\"status\": \"affected\", \"version\": \"1.2.0\"}, {\"status\": \"affected\", \"version\": \"1.1.0\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:fortinet:forticamera:2.1.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:forticamera:2.1.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:forticamera:2.1.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:forticamera:2.1.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:forticamera:2.0.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:forticamera:1.1.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:forticamera:1.1.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:forticamera:1.1.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:forticamera:1.1.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:forticamera:1.1.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:forticamera:1.1.0:*:*:*:*:*:*:*\"], \"vendor\": \"Fortinet\", \"product\": \"FortiCamera\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.1.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"2.1.3\"}, {\"status\": \"affected\", \"version\": \"2.0.0\"}, {\"status\": \"affected\", \"version\": \"1.1.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"1.1.5\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:fortinet:fortirecorder:7.2.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortirecorder:7.2.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortirecorder:7.2.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortirecorder:7.2.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortirecorder:7.0.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortirecorder:7.0.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortirecorder:7.0.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortirecorder:7.0.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortirecorder:7.0.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortirecorder:7.0.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortirecorder:6.4.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortirecorder:6.4.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortirecorder:6.4.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortirecorder:6.4.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortirecorder:6.4.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortirecorder:6.4.0:*:*:*:*:*:*:*\"], \"vendor\": \"Fortinet\", \"product\": \"FortiRecorder\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.2.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.2.3\"}, {\"status\": \"affected\", \"version\": \"7.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.0.5\"}, {\"status\": \"affected\", \"version\": \"6.4.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.4.5\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:fortinet:fortivoice:7.2.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:7.0.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:7.0.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:7.0.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:7.0.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:7.0.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:7.0.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:7.0.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:6.4.10:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:6.4.9:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:6.4.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:6.4.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:6.4.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:6.4.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:6.4.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:6.4.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:6.4.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:6.4.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortivoice:6.4.0:*:*:*:*:*:*:*\"], \"vendor\": \"Fortinet\", \"product\": \"FortiVoice\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.2.0\"}, {\"status\": \"affected\", \"version\": \"7.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.0.6\"}, {\"status\": \"affected\", \"version\": \"6.4.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.4.10\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:fortinet:fortimail:7.6.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.6.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.6.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.4.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.4.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.4.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.4.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.4.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.2.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.2.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.2.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.2.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.2.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.2.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.2.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.2.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.0.8:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.0.7:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.0.6:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.0.5:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.0.4:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.0.3:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.0.2:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.0.1:*:*:*:*:*:*:*\", \"cpe:2.3:a:fortinet:fortimail:7.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"Fortinet\", \"product\": \"FortiMail\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.6.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.6.2\"}, {\"status\": \"affected\", \"version\": \"7.4.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.4.4\"}, {\"status\": \"affected\", \"version\": \"7.2.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.2.7\"}, {\"status\": \"affected\", \"version\": \"7.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.0.8\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Upgrade to FortiNDR version 7.6.1 or above\\nUpgrade to FortiNDR version 7.4.8 or above\\nUpgrade to FortiNDR version 7.2.5 or above\\nUpgrade to FortiNDR version 7.0.7 or above\\nUpgrade to FortiCamera version 2.1.4 or above\\nUpgrade to FortiRecorder version 7.2.4 or above\\nUpgrade to FortiRecorder version 7.0.6 or above\\nUpgrade to FortiRecorder version 6.4.6 or above\\nUpgrade to FortiVoice version 7.2.1 or above\\nUpgrade to FortiVoice version 7.0.7 or above\\nUpgrade to FortiVoice version 6.4.11 or above\\nUpgrade to FortiMail version 7.6.3 or above\\nUpgrade to FortiMail version 7.4.5 or above\\nUpgrade to FortiMail version 7.2.8 or above\\nUpgrade to FortiMail version 7.0.9 or above\"}], \"references\": [{\"url\": \"https://fortiguard.fortinet.com/psirt/FG-IR-25-254\", \"name\": \"https://fortiguard.fortinet.com/psirt/FG-IR-25-254\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A stack-based buffer overflow vulnerability [CWE-121] vulnerability in Fortinet FortiCamera 2.1.0 through 2.1.3, FortiCamera 2.0 all versions, FortiCamera 1.1 all versions, FortiMail 7.6.0 through 7.6.2, FortiMail 7.4.0 through 7.4.4, FortiMail 7.2.0 through 7.2.7, FortiMail 7.0.0 through 7.0.8, FortiNDR 7.6.0, FortiNDR 7.4.0 through 7.4.7, FortiNDR 7.2.0 through 7.2.4, FortiNDR 7.0.0 through 7.0.6, FortiRecorder 7.2.0 through 7.2.3, FortiRecorder 7.0.0 through 7.0.5, FortiRecorder 6.4.0 through 6.4.5, FortiVoice 7.2.0, FortiVoice 7.0.0 through 7.0.6, FortiVoice 6.4.0 through 6.4.10 allows a remote unauthenticated attacker to execute arbitrary code or commands via sending HTTP requests with specially crafted hash cookie.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-121\", \"description\": \"Execute unauthorized code or commands\"}]}], \"providerMetadata\": {\"orgId\": \"6abe59d8-c742-4dff-8ce8-9b0ca1073da8\", \"shortName\": \"fortinet\", \"dateUpdated\": \"2026-01-15T12:54:22.845Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-32756\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-15T12:54:22.845Z\", \"dateReserved\": \"2025-04-10T08:12:12.347Z\", \"assignerOrgId\": \"6abe59d8-c742-4dff-8ce8-9b0ca1073da8\", \"datePublished\": \"2025-05-13T14:46:44.208Z\", \"assignerShortName\": \"fortinet\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…