Multiple vulnerabilities in Fortinet products



Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2024-50563
CVE-2024-48886
CWE-ID CWE-1390
Exploitation vector Network
Public exploit N/A
Vulnerable software
FortiAnalyzer Cloud
Server applications / Other server solutions

FortiAnalyzer
Server applications / IDS/IPS systems, Firewalls and proxy servers

FortiManager
Server applications / IDS/IPS systems, Firewalls and proxy servers

FortiOS
Operating systems & Components / Operating system

FortiProxy
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Fortinet, Inc

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Weak authentication

EUVDB-ID: #VU107372

Risk: High

CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-50563

CWE-ID: CWE-1390 - Weak Authentication

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The vulnerability exists due to weak authentication in csfd daemon. An unauthenticated attacker with access to the security fabric interface and port can bypass the authentication process and access a restricted list of features.

Mitigation

Install update from vendor's website.

Vulnerable software versions

FortiAnalyzer Cloud: 7.4.1 - 7.4.3

FortiAnalyzer: 7.4.1 - 7.6.1

FortiManager: 7.4.1 - 7.6.1

FortiOS: 6.4.0 - 7.4.4

FortiProxy: 2.0.0 - 7.4.4

CPE2.3 External links

https://www.fortiguard.com/psirt/FG-IR-24-221


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Weak authentication

EUVDB-ID: #VU107373

Risk: High

CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-48886

CWE-ID: CWE-1390 - Weak Authentication

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The vulnerability exists due to weak authentication in csfd daemon. An unauthenticated attacker with access to the security fabric interface and port can bypass the authentication process and access a restricted list of features.

Mitigation

Install update from vendor's website.

Vulnerable software versions

FortiAnalyzer Cloud: 7.4.1 - 7.4.3

FortiAnalyzer: 7.4.1 - 7.6.1

FortiManager: 7.4.1 - 7.6.1

FortiOS: 6.4.0 - 7.4.4

FortiProxy: 2.0.0 - 7.4.4

CPE2.3 External links

https://www.fortiguard.com/psirt/FG-IR-24-221


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###