Metrics
Affected Vendors & Products
No advisories yet.
Solution
Upgrade to FortiFone version 7.2.0 or above Upgrade to FortiFone version 7.0.2 or above Upgrade to FortiFone version 3.0.24 or above
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-25-260 |
|
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fortinet
Fortinet fortifone Fortinet fortinet |
|
| Vendors & Products |
Fortinet
Fortinet fortifone Fortinet fortinet |
Tue, 13 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An exposure of sensitive information to an unauthorized actor [CWE-200] vulnerability in Fortinet FortiFone 7.0.0 through 7.0.1, FortiFone 3.0.13 through 3.0.23 allows an unauthenticated attacker to obtain the device configuration via crafted HTTP or HTTPS requests. | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2026-01-14T09:16:17.029Z
Reserved: 2025-05-12T13:58:15.235Z
Link: CVE-2025-47855
Updated: 2026-01-13T21:41:02.725Z
Status : Received
Published: 2026-01-13T17:15:57.520
Modified: 2026-01-13T17:15:57.520
Link: CVE-2025-47855
No data.
OpenCVE Enrichment
Updated: 2026-01-14T11:08:45Z