WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships (TLP:CLEAR) Critical Zero Day Vulnerabilities in Fortinet and Ivanti Impact a Range of Products and Services
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

(TLP:CLEAR) Critical Zero Day Vulnerabilities in Fortinet and Ivanti Impact a Range of Products and Services

TLP:CLEAR

Author: Chase Snow

Created: Thursday, May 15, 2025 - 14:33

Categories: Cybersecurity, Security Preparedness

Summary: On Tuesday, Ivanti and Fortinet both released security advisories for critical zero day vulnerabilities affecting a range of products and urged customers to apply fixes as soon as possible.

Fortinet released an advisory regarding CVE-2025-32756 (CVSS 9.8), a stack-based overflow vulnerability that affects FortiVoice, FortiMakil, FortiNDR, FortiRecorder, and FortiCamera. If exploited, a remote unauthenticated attacker could execute arbitrary code or commands via crafted HTTP requests. Additionally, Fortinet has reported that they have observed exploitation of this vulnerability in the wild on FortiVoice.

Ivanti announced security patches for two zero days affecting Endpoint Manager Mobile (EPMM). One of them, tracked as CVE-2025-4427 is an authentication bypass vulnerability allowing threat actors to access protected resources without credentials. The second flaw, CVE-2025-4428, is a remote code execution issue that allows unauthenticated attackers to execute arbitrary code. Both vulnerabilities can be chained together to achieve unauthenticated remote code execution.

Analyst Note: WaterISAC recommends members promptly follow the guidance put out by both Fortinet and Ivanti to update affected products and utilize workarounds where applicable.

Additional Reading:

  • Fortinet fixes critical zero-day exploited in FortiVoice attacks
  • Ivanti fixes EPMM zero-days chained in code execution attacks

Mitigation Recommendations:

  • Fortinet – Stack-based buffer overflow vulnerability in API
  • Ivanti – Security Advisory Ivanti Endpoint Manager Mobile (EPMM) May 2025 (CVE-2025-4427 and CVE-2025-4428)

Related WaterISAC PIRs: 6, 8, 12

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar