Cyber Posture

CVE-2025-24470

High

Published: 11 February 2025

Published
11 February 2025
Modified
22 July 2025
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.0067 71.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.

Security Summary

CVE-2025-24470 is an Improper Resolution of Path Equivalence vulnerability (CWE-41) in FortiPortal versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, and 7.0.0 through 7.0.11. This issue enables a remote unauthenticated attacker to retrieve source code via crafted HTTP requests. The vulnerability carries a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N), reflecting its high severity stemming from network-based access, low attack complexity, no required privileges or user interaction, changed scope, and high confidentiality impact.

A remote unauthenticated attacker can exploit CVE-2025-24470 by sending specially crafted HTTP requests to an affected FortiPortal instance accessible over the network. Successful exploitation allows the attacker to retrieve source code, potentially disclosing sensitive application logic, configurations, or other proprietary information without impacting integrity or availability.

Mitigation details are provided in the Fortinet PSIRT advisory FG-IR-25-015, available at https://fortiguard.fortinet.com/psirt/FG-IR-25-015. Security practitioners should consult this reference for patch information and recommended remediation steps.

Details

CWE(s)
CWE-41

Affected Products

fortinet
fortiportal
7.0.0 — 7.0.12 · 7.2.0 — 7.2.7 · 7.4.0 — 7.4.3

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

The vulnerability in the public-facing FortiPortal web application directly enables remote unauthenticated exploitation for initial access (T1190) and retrieval of source code as data from the local system (T1005).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References