Fortinet’s Vulnerability Patch-a-Palooza: Critical Fixes You Can’t Ignore!

Fortinet has released patches for a dozen vulnerabilities, including a critical zero-day bug, CVE-2025-32756, affecting FortiVoice phone systems. This flaw, with a severity score of 9.6, lets unauthenticated attackers execute code using crafted HTTP requests. Customers are urged to patch pronto, lest their phone systems become a hotline for hackers.

Pro Dashboard

Hot Take:

Looks like Fortinet just played a game of whack-a-mole with vulnerabilities, and the moles were winning for a while! FortiVoice users, it’s time to hang up those phones and patch faster than you can say ‘zero-day exploit’. Who knew phone systems could be this exciting?

Key Points:

  • Fortinet patched a critical zero-day vulnerability (CVE-2025-32756) in FortiVoice phone systems.
  • Threat actors exploited this vulnerability in the wild, affecting multiple Fortinet products.
  • Patches were also issued for other critical and high-severity vulnerabilities across Fortinet’s product suite.
  • Fortinet advises disabling HTTP/HTTPS administrative interfaces as a workaround for the zero-day.
  • Additional affected products and updates are detailed in Fortinet’s PSIRT advisories.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?