Cyber Posture

CVE-2024-35279

High

Published: 11 February 2025

Published
11 February 2025
Modified
17 July 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0196 83.6th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

A stack-based buffer overflow [CWE-121] vulnerability in Fortinet FortiOS version 7.2.4 through 7.2.8 and version 7.4.0 through 7.4.4 allows a remote unauthenticated attacker to execute arbitrary code or commands via crafted UDP packets through the CAPWAP control, provided the attacker were able to evade FortiOS stack protections and provided the fabric service is running on the exposed interface.

Security Summary

CVE-2024-35279 is a stack-based buffer overflow vulnerability (CWE-121) affecting Fortinet FortiOS versions 7.2.4 through 7.2.8 and 7.4.0 through 7.4.4. The issue resides in the CAPWAP control mechanism and requires the fabric service to be running on an exposed interface. It has a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to potential high impacts on confidentiality, integrity, and availability.

A remote unauthenticated attacker can exploit this vulnerability by sending crafted UDP packets to the CAPWAP control interface. Successful exploitation allows execution of arbitrary code or commands, provided the attacker evades FortiOS stack protections. The attack vector is network-accessible with high complexity required and no user interaction or privileges needed.

The Fortinet product security incident response team advisory FG-IR-24-160, available at https://fortiguard.fortinet.com/psirt/FG-IR-24-160, details affected versions and recommended mitigations.

Details

CWE(s)
CWE-121

Affected Products

fortinet
fortios
7.2.4 — 7.2.9 · 7.4.0 — 7.4.5

References