Header image

Actively Exploited Critical Fortinet Flaw Fixed

Attackers targeted the stack-based overflow bug.

Fortinet has addressed a critical zero-day remote code execution vulnerability, which is already actively exploited.

According to BleepingComputer, the vulnerability - tracked as CVE-2025-32756 - which has already been leveraged to compromise FortiVoice enterprise phone systems.

Attackers have used six IP addresses to launch attacks, exploiting the stack-based overflow bug, and used credential-stealing malware against systems which had the 'fcgi debugging' setting activated.

Fortinet's Product Security Team also noted the flaw impacted the company's FortiNDR, FortiMail, FortiCamera, and FortiRecorder offerings.


Dan Raywood
Dan Raywood

Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.

He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.

Dan Raywood
Dan Raywood

Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.

He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.

Upcoming Events

No events found.