Skip to content

Commit abb916e

Browse files
committed
Add detection module for CVE-2025-32756 (FortiVoice/FortiMail RCE)
Adds vuln module fortivoice_cve_2025_32756_vuln to detect exposure of /remote/hostcheck_validate endpoint on Fortinet FortiVoice, FortiMail, FortiNDR, FortiRecorder and FortiCamera devices. CVE-2025-32756 is a CVSS 9.8 stack-based buffer overflow allowing unauthenticated RCE via crafted HTTP requests. Actively exploited in the wild and listed on CISA KEV catalog. - Added docs/Modules.md entry - Fixed reference: (singular) per Nettacker schema - Fixed condition_type: and to prevent false positives Closes #1382
1 parent 85f9f91 commit abb916e

2 files changed

Lines changed: 55 additions & 0 deletions

File tree

docs/Modules.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -200,6 +200,7 @@ If you want to scan all ports please define -g 1-65535 range. Otherwise Nettacke
200200
- '**exponent_cms_cve_2021_38751_vuln**' – check the target for Exponent CMS CVE-2021-38751
201201
- '**f5_cve_2020_5902_vuln**' – check the target for F5 RCE CVE-2020-5902 vulnerability
202202
- '**forgerock_am_cve_2021_35464_vuln**' – check the target for ForgeRock AM CVE-2021-35464
203+
- '**fortivoice_cve_2025_32756_vuln**' – check the target for Fortinet FortiVoice/FortiMail/FortiNDR/FortiRecorder/FortiCamera CVE-2025-32756 unauthenticated RCE vulnerability
203204
- '**galera_webtemp_cve_2021_40960_vuln**' – check the target for Galera WebTemplate CVE-2021-40960
204205
- '**grafana_cve_2021_43798_vuln**' – check the target for Grafana CVE-2021-43798 vulnerability
205206
- '**graphql_vuln**' – check the target for exposed GraphQL introspection endpoint
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
info:
2+
name: fortivoice_cve_2025_32756_vuln
3+
author: Parneet Kaur
4+
severity: 9.8
5+
description: >
6+
Fortinet FortiVoice, FortiMail, FortiNDR, FortiRecorder and FortiCamera
7+
stack-based buffer overflow in /remote/hostcheck_validate allowing
8+
unauthenticated remote code execution via crafted HTTP requests.
9+
Actively exploited in the wild. CISA KEV listed.
10+
reference:
11+
- https://nvd.nist.gov/vuln/detail/CVE-2025-32756
12+
- https://www.fortiguard.com/psirt/FG-IR-25-254
13+
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
14+
profiles:
15+
- vuln
16+
- http
17+
- critical_severity
18+
- cve
19+
- cve2025
20+
- fortinet
21+
- fortivoice
22+
- cisa_kev
23+
payloads:
24+
- library: http
25+
steps:
26+
- method: get
27+
timeout: 3
28+
headers:
29+
User-Agent: "{user_agent}"
30+
ssl: false
31+
url:
32+
nettacker_fuzzer:
33+
input_format: "{{schema}}://{target}:{{ports}}/remote/hostcheck_validate"
34+
prefix: ""
35+
suffix: ""
36+
interceptors:
37+
data:
38+
schema:
39+
- "http"
40+
- "https"
41+
ports:
42+
- 80
43+
- 443
44+
- 8080
45+
- 8443
46+
response:
47+
condition_type: and
48+
conditions:
49+
status_code:
50+
regex: "^(200|400|405|500)$"
51+
reverse: false
52+
content:
53+
regex: "(?i)(FortiVoice|FortiMail|FortiNDR|FortiRecorder|FortiCamera|hostcheck)"
54+
reverse: false

0 commit comments

Comments
 (0)