CVE-2024-35276
Published: 14 January 2025
Description
A stack-based buffer overflow in Fortinet FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, 6.4.1 through 6.4.7, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, 6.4.1 through 6.4.7 allows attacker to execute unauthorized code or commands via specially crafted packets.
Security Summary
CVE-2024-35276 is a stack-based buffer overflow vulnerability (CWE-121, CWE-787) affecting multiple Fortinet products, including FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, and 6.4.0 through 6.4.14; FortiManager versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, and 6.4.0 through 6.4.14; FortiManager Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, and 6.4.1 through 6.4.7; and FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, and 6.4.1 through 6.4.7. The vulnerability, published on January 14, 2025, has a CVSS v3.1 base score of 5.6 (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).
A remote, unauthenticated attacker can exploit this vulnerability by sending specially crafted packets to the affected devices, potentially leading to execution of unauthorized code or commands. The high attack complexity (AC:H) limits feasibility, but successful exploitation could result in low-level impacts: limited confidentiality, integrity, and availability effects without scope change.
Fortinet's advisory (FG-IR-24-165) at https://fortiguard.fortinet.com/psirt/FG-IR-24-165 provides details on affected versions and recommended mitigations, including available patches for upgrading to fixed releases. Security practitioners should review the advisory for version-specific remediation steps.
Details
- CWE(s)