Cyber Posture

CVE-2024-48886

Critical

Published: 14 January 2025

Published
14 January 2025
Modified
03 February 2025
KEV Added
Patch
CVSS Score 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0056 68.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

A weak authentication in Fortinet FortiOS versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, FortiProxy versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3 allows attacker to execute unauthorized code or commands via a brute-force attack.

Security Summary

CVE-2024-48886 is a weak authentication vulnerability present in several Fortinet products, including FortiOS versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, and 6.4.0 through 6.4.15; FortiProxy versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.17, and 2.0.0 through 2.0.14; FortiManager versions 7.6.0 through 7.6.1 and 7.4.1 through 7.4.3; FortiManager Cloud versions 7.4.1 through 7.4.3; and FortiAnalyzer Cloud versions 7.4.1 through 7.4.3. The flaw, associated with CWE-1390 and NVD-CWE-Other, enables attackers to execute unauthorized code or commands through a brute-force attack. It carries a CVSS v3.1 base score of 9.0 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).

A remote, unauthenticated attacker can exploit this vulnerability over the network by performing a brute-force attack, which requires high attack complexity but no user interaction. Successful exploitation grants the attacker the ability to execute arbitrary code or commands on the affected system, potentially leading to full compromise given the high impacts on confidentiality, integrity, availability, and changed scope.

Mitigation details and patches are outlined in the Fortinet PSIRT advisory available at https://fortiguard.fortinet.com/psirt/FG-IR-24-221. Security practitioners should consult this reference for version-specific remediation guidance.

Details

CWE(s)
CWE-1390NVD-CWE-Other

Affected Products

fortinet
fortianalyzer
7.4.1 — 7.4.4 · 7.6.0 — 7.6.2
fortinet
fortianalyzer cloud
7.4.1 — 7.4.4
fortinet
fortimanager
7.4.1 — 7.4.4 · 7.6.0 — 7.6.2
fortinet
fortimanager cloud
7.4.1 — 7.4.4
fortinet
fortiproxy
2.0.0 — 2.0.15 · 7.0.0 — 7.0.18 · 7.2.0 — 7.2.11
fortinet
fortios
6.4.0 — 7.0.16 · 7.2.0 — 7.2.9 · 7.4.0 — 7.4.5

References