Cyber Posture

CVE-2024-35276

Medium

Published: 14 January 2025

Published
14 January 2025
Modified
31 January 2025
KEV Added
Patch
CVSS Score 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0017 37.3th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Description

A stack-based buffer overflow in Fortinet FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, 6.4.1 through 6.4.7, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, 6.4.1 through 6.4.7 allows attacker to execute unauthorized code or commands via specially crafted packets.

Security Summary

CVE-2024-35276 is a stack-based buffer overflow vulnerability (CWE-121, CWE-787) affecting multiple Fortinet products, including FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, and 6.4.0 through 6.4.14; FortiManager versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, and 6.4.0 through 6.4.14; FortiManager Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, and 6.4.1 through 6.4.7; and FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, and 6.4.1 through 6.4.7. The vulnerability, published on January 14, 2025, has a CVSS v3.1 base score of 5.6 (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).

A remote, unauthenticated attacker can exploit this vulnerability by sending specially crafted packets to the affected devices, potentially leading to execution of unauthorized code or commands. The high attack complexity (AC:H) limits feasibility, but successful exploitation could result in low-level impacts: limited confidentiality, integrity, and availability effects without scope change.

Fortinet's advisory (FG-IR-24-165) at https://fortiguard.fortinet.com/psirt/FG-IR-24-165 provides details on affected versions and recommended mitigations, including available patches for upgrading to fixed releases. Security practitioners should review the advisory for version-specific remediation steps.

Details

CWE(s)
CWE-121CWE-787

Affected Products

fortinet
fortianalyzer
6.4.0 — 6.4.15 · 7.0.0 — 7.0.13 · 7.2.0 — 7.2.6
fortinet
fortianalyzer cloud
6.4.1 — 7.0.12 · 7.2.1 — 7.2.6 · 7.4.1 — 7.4.4
fortinet
fortimanager
6.4.0 — 6.4.15 · 7.0.0 — 7.0.13 · 7.2.0 — 7.2.6
fortinet
fortimanager cloud
6.4.1 — 7.0.12 · 7.2.1 — 7.2.6 · 7.4.1 — 7.4.4

References