Cyber Posture

CVE-2024-26006

High

Published: 14 March 2025

Published
14 March 2025
Modified
24 July 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0042 61.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse various implementations of JavaScript for execution.

Security Summary

CVE-2024-26006 is an improper neutralization of input during web page generation vulnerability (CWE-79), enabling cross-site scripting (XSS) in the web SSL VPN UI of FortiOS versions 7.4.3 and below, 7.2.7 and below, and 7.0.13 and below, as well as FortiProxy versions 7.4.3 and below, 7.2.9 and below, and 7.0.16 and below. Published on 2025-03-14, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).

A remote unauthenticated attacker can exploit this vulnerability by leveraging a malicious Samba server to inject scripts into the SSL VPN web UI. Exploitation requires high attack complexity and user interaction, such as a victim accessing the VPN portal in a way that triggers interaction with the attacker's controlled Samba server, potentially leading to high-impact confidentiality, integrity, and availability consequences within the user's browser context.

Fortinet's advisory at https://fortiguard.fortinet.com/psirt/FG-IR-23-485 provides details on affected versions and mitigation recommendations. Security practitioners should consult this reference for patching instructions and workarounds.

Details

CWE(s)
CWE-79

Affected Products

fortinet
fortios
6.4.0 — 7.0.14 · 7.2.0 — 7.2.8 · 7.4.0 — 7.4.4
fortinet
fortiproxy
7.0.0 — 7.0.17 · 7.2.0 — 7.2.10 · 7.4.0 — 7.4.4

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

The CVE describes an XSS vulnerability (CWE-79) in the public-facing SSL VPN web UI, directly enabling exploitation of public-facing applications via script injection and execution of JavaScript in the victim's browser context.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References