Cyber Posture

CVE-2024-46662

High

Published: 14 March 2025

Published
14 March 2025
Modified
24 July 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0030 53.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2024-46662 is a command injection vulnerability (CWE-77), resulting from improper neutralization of special elements used in a command, affecting Fortinet FortiManager versions 7.4.1 through 7.4.3 and FortiManager Cloud versions 7.4.1 through 7.4.3. The issue, published on 2025-03-14T15:15:43.200, carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and enables privilege escalation via specifically crafted packets.

An attacker requires low privileges (PR:L) to exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation allows the attacker to achieve high impacts on confidentiality, integrity, and availability (C:I:A:H), specifically through privilege escalation.

The Fortinet advisory FG-IR-24-222 at https://fortiguard.fortinet.com/psirt/FG-IR-24-222 provides details on mitigation and patching recommendations for affected versions.

Details

CWE(s)
CWE-77

Affected Products

fortinet
fortimanager
7.4.1 — 7.4.4
fortinet
fortimanager cloud
7.4.1 — 7.4.4

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Command injection vulnerability in FortiManager directly enables privilege escalation from low-privileged access over the network.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References