Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-47855 β€” AI Deep Analysis Summary

CVSS 9.3 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical info leak in FortiFone IP phones. πŸ“‰ **Consequences**: Attackers can steal full device configurations via crafted HTTP/HTTPS requests. Total exposure of sensitive network data!

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-200** (Information Exposure). πŸ› **Flaw**: The system fails to restrict access to configuration endpoints, allowing unauthorized retrieval of internal settings.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected Products**: Fortinet FortiFone IP Phones. πŸ“… **Vulnerable Versions**: β€’ 7.0.0 to 7.0.1 β€’ 3.0.13 to 3.0.23. ⚠️ Check your firmware immediately!

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: Extract complete device configurations. πŸ”‘ **Data at Risk**: Network credentials, SIP settings, and internal topology.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Exploitation Threshold**: **LOW**. 🚫 **Auth Required**: None (PR:N). 🌐 **Access**: Network (AV:N). πŸ–±οΈ **User Interaction**: None (UI:N). Easy to exploit remotely without login!

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ•΅οΈ **Public Exploit**: **No** public PoC or wild exploitation detected yet. πŸ“ **Status**: References point to Fortinet PSIRT advisory (FG-IR-25-260). Stay alert for future PoCs!

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for FortiFone devices on ports 80/443. πŸ“‘ **Test**: Send crafted HTTP/HTTPS requests to config endpoints. πŸ“Š **Monitor**: Look for unexpected configuration data in response bodies.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Official Fix**: Yes! Patch available via Fortinet PSIRT. πŸ”— **Ref**: [FG-IR-25-260](https://fortiguard.fortinet.com/psirt/FG-IR-25-260). πŸ“₯ **Action**: Update firmware to non-vulnerable versions ASAP.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: Restrict network access to FortiFone management interfaces. 🚫 **Firewall**: Block external HTTP/HTTPS access to these devices. πŸ”’ **Isolate**: Segment VoIP traffic from public networks.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: Immediate action required. High CVSS score + No Auth needed = High risk. πŸƒ **Action**: Patch or isolate NOW to prevent data breach!