#VU107373 Weak authentication in Fortinet, Inc products - CVE-2024-48886


Vulnerability identifier: #VU107373

Vulnerability risk: High

CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-48886

CWE-ID: CWE-1390

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
FortiAnalyzer Cloud
Server applications / Other server solutions
FortiAnalyzer
Server applications / IDS/IPS systems, Firewalls and proxy servers
FortiManager
Server applications / IDS/IPS systems, Firewalls and proxy servers
FortiOS
Operating systems & Components / Operating system
FortiProxy
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor: Fortinet, Inc

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The vulnerability exists due to weak authentication in csfd daemon. An unauthenticated attacker with access to the security fabric interface and port can bypass the authentication process and access a restricted list of features.

Mitigation
Install update from vendor's website.

Vulnerable software versions

FortiAnalyzer Cloud: 7.4.1 - 7.4.3

FortiAnalyzer: 7.4.1 - 7.4.3, 7.6.0 - 7.6.1

FortiManager: 7.4.1 - 7.4.3, 7.6.0 - 7.6.1

FortiOS: 6.4.0 - 6.4.16, 7.0.0 - 7.0.15, 7.2.0 - 7.2.8, 7.4.0 - 7.4.4

FortiProxy: 2.0.0 - 2.0.14, 7.0.0 - 7.0.17, 7.2.0 - 7.2.10, 7.4.0 - 7.4.4


External links
https://www.fortiguard.com/psirt/FG-IR-24-221


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability