Description
An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in Fortinet FortiFone 7.0.0 through 7.0.1, FortiFone 3.0.13 through 3.0.23 allows an unauthenticated attacker to obtain the device configuration via crafted HTTP or HTTPS requests.
Published: 2026-01-13
Score: 9.3 Critical
EPSS: 1.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade to FortiFone version 7.2.0 or above Upgrade to FortiFone version 7.0.2 or above Upgrade to FortiFone version 3.0.24 or above

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 14 Jan 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Fortinet
Fortinet fortifone
Fortinet fortinet
Vendors & Products Fortinet
Fortinet fortifone
Fortinet fortinet

Tue, 13 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
Description An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in Fortinet FortiFone 7.0.0 through 7.0.1, FortiFone 3.0.13 through 3.0.23 allows an unauthenticated attacker to obtain the device configuration via crafted HTTP or HTTPS requests.
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C'}


Subscriptions

Fortinet Fortifone Fortinet
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2026-01-14T09:16:17.029Z

Reserved: 2025-05-12T13:58:15.235Z

Link: CVE-2025-47855

cve-icon Vulnrichment

Updated: 2026-01-13T21:41:02.725Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-13T17:15:57.520

Modified: 2026-01-14T16:25:40.430

Link: CVE-2025-47855

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-14T11:08:45Z

Weaknesses