Vulnerability identifier: #VU107373
Vulnerability risk: High
CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-48886
CWE-ID:
CWE-1390
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
FortiAnalyzer Cloud
Server applications /
Other server solutions
FortiAnalyzer
Server applications /
IDS/IPS systems, Firewalls and proxy servers
FortiManager
Server applications /
IDS/IPS systems, Firewalls and proxy servers
FortiOS
Operating systems & Components /
Operating system
FortiProxy
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Vendor: Fortinet, Inc
Description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The vulnerability exists due to weak authentication in csfd daemon. An unauthenticated attacker with access to the security fabric interface and port can bypass the authentication process and access a restricted list of features.
Mitigation
Install update from vendor's website.
Vulnerable software versions
FortiAnalyzer Cloud: 7.4.1 - 7.4.3
FortiAnalyzer: 7.4.1 - 7.4.3, 7.6.0 - 7.6.1
FortiManager: 7.4.1 - 7.4.3, 7.6.0 - 7.6.1
FortiOS: 6.4.0 - 6.4.16, 7.0.0 - 7.0.15, 7.2.0 - 7.2.8, 7.4.0 - 7.4.4
FortiProxy: 2.0.0 - 2.0.14, 7.0.0 - 7.0.17, 7.2.0 - 7.2.10, 7.4.0 - 7.4.4
External links
https://www.fortiguard.com/psirt/FG-IR-24-221
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.