CVE-2024-26009

EUVD-2024-23305
An authentication bypass using an alternate path or channel [CWE-288] vulnerability in Fortinet FortiOS 6.4.0 through 6.4.15, FortiOS 6.2.0 through 6.2.16, FortiOS 6.0 all versions, FortiPAM 1.2.0, FortiPAM 1.1.0 through 1.1.2, FortiPAM 1.0.0 through 1.0.3, FortiProxy 7.4.0 through 7.4.2, FortiProxy 7.2.0 through 7.2.8, FortiProxy 7.0.0 through 7.0.15, FortiSwitchManager 7.2.0 through 7.2.3, FortiSwitchManager 7.0.0 through 7.0.3 allows an unauthenticated attacker to seize control of a managed device via crafted FGFM requests, if the device is managed by a FortiManager, and if the attacker knows that FortiManager's serial number.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 31%
Affected Products (NVD)
VendorProductVersion
fortinetfortiswitchmanager
7.0.0 ≤
𝑥
< 7.0.4
fortinetfortiswitchmanager
7.2.0 ≤
𝑥
< 7.2.4
fortinetfortiproxy
7.0.0 ≤
𝑥
< 7.0.16
fortinetfortiproxy
7.2.0 ≤
𝑥
< 7.2.9
fortinetfortiproxy
7.4.0 ≤
𝑥
< 7.4.3
fortinetfortipam
1.0.0 ≤
𝑥
≤ 1.2.0
fortinetfortios
6.0.0 ≤
𝑥
< 6.2.17
fortinetfortios
6.4.0 ≤
𝑥
< 6.4.16
𝑥
= Vulnerable software versions