Summary
Detail | |||
---|---|---|---|
Vendor | Fortinet | First view | 2018-07-05 |
Product | Fortios | Last view | 2025-07-15 |
Version | 5.6.11 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:fortinet:fortios |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.7 | 2025-07-15 | CVE-2025-24477 | A heap-based buffer overflow in Fortinet FortiOS versions 7.6.0 through 7.6.2, 7.4.0 through 7.4.7, 7.2.4 through 7.2.11 allows an attacker to escalate its privileges via a specially crafted CLI command |
0 | 2025-07-08 | CVE-2024-55599 | An Improperly Implemented Security Check for Standard vulnerability [CWE-358] in FortiOS version 7.6.0, version 7.4.7 and below, 7.0 all versions, 6.4 all versions and FortiProxy version 7.6.1 and below, version 7.4.8 and below, 7.2 all versions, 7.0 all versions may allow a remote unauthenticated user to bypass the DNS filter via Apple devices. |
0 | 2025-07-08 | CVE-2024-52965 | A missing critical step in authentication vulnerability [CWE-304] in Fortinet FortiOS version 7.6.0 through 7.6.1, 7.4.0 through 7.4.5, 7.2.0 through 7.2.10, and before 7.0.16 & FortiProxy version 7.6.0 through 7.6.1, 7.4.0 through 7.4.8, 7.2.0 through 7.2.13 and before 7.0.20 allows an API-user using api-key + PKI user certificate authentication to login even if the certificate is invalid. |
4.3 | 2025-06-10 | CVE-2025-25250 | An Exposure of Sensitive Information to an Unauthorized Actor vulnerability [CWE-200] in FortiOS version 7.6.0, version 7.4.7 and below, 7.2 all versions, 7.0 all versions, 6.4 all versions SSL-VPN web-mode may allow an authenticated user to access full SSL-VPN settings via crafted URL. |
0 | 2025-06-10 | CVE-2025-24471 | An Improper Certificate Validation vulnerability [CWE-295] in FortiOS version 7.6.1 and below, version 7.4.7 and below may allow an EAP verified remote user to connect from FortiClient via revoked certificate. |
7.2 | 2025-06-10 | CVE-2025-22254 | An Improper Privilege Management vulnerability [CWE-269] affecting Fortinet FortiOS version 7.6.0 through 7.6.1, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16 and before 6.4.15, FortiProxy version 7.6.0 through 7.6.1 and before 7.4.7 & FortiWeb version 7.6.0 through 7.6.1 and before 7.4.6 allows an authenticated attacker with at least read-only admin permissions to gain super-admin privileges via crafted requests to Node.js websocket module. |
5.3 | 2025-06-10 | CVE-2025-22251 | An improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in FortiOS 7.6.0, 7.4.0 through 7.4.5, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an unauthenticated attacker to inject unauthorized sessions via crafted FGSP session synchronization packets. |
0 | 2025-06-10 | CVE-2024-50568 | A channel accessible by non-endpoint vulnerability [CWE-300] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7 and before 7.0.14 & FortiProxy version 7.4.0 through 7.4.3, 7.2.0 through 7.2.9 and before 7.0.16 allows an unauthenticated attacker with the knowledge of device specific data to spoof the identity of a downstream device of the security fabric via crafted TCP requests. |
0 | 2025-06-10 | CVE-2024-50562 | An Insufficient Session Expiration vulnerability [CWE-613] in FortiOS SSL-VPN version 7.6.0, version 7.4.6 and below, version 7.2.10 and below, 7.0 all versions, 6.4 all versions may allow an attacker in possession of a cookie used to log in the SSL-VPN portal to log in again, although the session has expired or was logged out. |
2.3 | 2025-06-10 | CVE-2023-29184 | An incomplete cleanup vulnerability [CWE-459] in FortiOS 7.2 all versions and before & FortiProxy version 7.2.0 through 7.2.2 and before 7.0.8 allows a VDOM privileged attacker to add SSH key files on the system silently via crafted CLI requests. |
3.7 | 2025-05-28 | CVE-2025-47295 | A buffer over-read in Fortinet FortiOS versions 7.4.0 through 7.4.3, versions 7.2.0 through 7.2.7, and versions 7.0.0 through 7.0.14 may allow a remote unauthenticated attacker to crash the FGFM daemon via a specially crafted request, under rare conditions that are outside of the attacker's control. |
5.3 | 2025-05-28 | CVE-2025-47294 | A integer overflow or wraparound in Fortinet FortiOS versions 7.2.0 through 7.2.7, versions 7.0.0 through 7.0.14 may allow a remote unauthenticated attacker to crash the csfd daemon via a specially crafted request. |
7.2 | 2025-05-28 | CVE-2025-22252 | A missing authentication for critical function in Fortinet FortiProxy versions 7.6.0 through 7.6.1, FortiSwitchManager version 7.2.5, and FortiOS versions 7.4.4 through 7.4.6 and version 7.6.0 may allow an attacker with knowledge of an existing admin account to access the device as a valid admin via an authentication bypass. |
7.5 | 2025-04-08 | CVE-2024-50565 | A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15 and 6.2.0 through 6.2.16, Fortinet FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.15 and 2.0.0 through 2.0.14, Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and 6.2.0 through 6.2.13, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and 6.2.0 through 6.2.13, Fortinet FortiVoice version 7.0.0 through 7.0.2, 6.4.0 through 6.4.8 and 6.0.0 through 6.0.12 and Fortinet FortiWeb version 7.4.0 through 7.4.2, 7.2.0 through 7.2.10, 7.0.0 through 7.0.10 allows an unauthenticated attacker in a man-in-the-middle position to impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager), via intercepting the FGFM authentication request between the management device and the managed device |
4.4 | 2025-04-08 | CVE-2024-32122 | A storing passwords in a recoverable format in Fortinet FortiOS versions 7.2.0 through 7.2.1 allows attacker to information disclosure via modification of LDAP server IP to point to a malicious server. |
0 | 2025-04-08 | CVE-2024-26013 | A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15 and before 6.2.16, Fortinet FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9 and before 7.0.15, Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and before 6.2.13, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and before 6.2.13, Fortinet FortiVoice version 7.0.0 through 7.0.2 before 6.4.8 and Fortinet FortiWeb before 7.4.2 may allow an unauthenticated attacker in a man-in-the-middle position to impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager), via intercepting the FGFM authentication request between the management device and the managed device |
8.8 | 2025-04-08 | CVE-2023-37930 | Multiple issues including the use of uninitialized ressources [CWE-908] and excessive iteration [CWE-834] vulnerabilities in Fortinet FortiOS SSL VPN webmode version 7.4.0, version 7.2.0 through 7.2.5, version 7.0.1 through 7.0.11 and version 6.4.7 through 6.4.14 and Fortinet FortiProxy SSL VPN webmode version 7.2.0 through 7.2.6 and version 7.0.0 through 7.0.12 allows a VPN user to corrupt memory potentially leading to code or commands execution via specifically crafted requests. |
0 | 2025-03-24 | CVE-2023-25610 | A buffer underwrite ('buffer underflow') vulnerability in the administrative interface of Fortinet FortiOS version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.6, version 6.4.0 through 6.4.11 and version 6.2.12 and below, FortiProxy version 7.2.0 through 7.2.2, version 7.0.0 through 7.0.8, version 2.0.12 and below and FortiOS-6K7K version 7.0.5, version 6.4.0 through 6.4.10 and version 6.2.0 through 6.2.10 and below allows a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests. |
6.1 | 2025-03-21 | CVE-2019-16151 | An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiOS 6.4.1 and below, 6.2.9 and below may allow a remote unauthenticated attacker to either redirect users to malicious websites via a crafted "Host" header or to execute JavaScript code in the victim's browser context. This happens when the FortiGate has web filtering and category override enabled/configured. |
0 | 2025-03-17 | CVE-2020-29010 | An exposure of sensitive information to an unauthorized actor vulnerability in FortiOS version 6.2.4 and below, version 6.0.10 and belowmay allow remote authenticated actors to read the SSL VPN events log entries of users in other VDOMs by executing "get vpn ssl monitor" from the CLI. The sensitive data includes usernames, user groups, and IP address. |
6.1 | 2025-03-17 | CVE-2019-6697 | An Improper Neutralization of Input vulnerability affecting FortiGate version 6.2.0 through 6.2.1, 6.0.0 through 6.0.6 in the hostname parameter of a DHCP packet under DHCP monitor page may allow an unauthenticated attacker in the same network as the FortiGate to perform a Stored Cross Site Scripting attack (XSS) by sending a crafted DHCP packet. |
5.4 | 2025-03-17 | CVE-2019-15706 | An improper neutralization of input during web page generation in the SSL VPN portal of FortiProxy version 2.0.0, version 1.2.9 and below and FortiOS version 6.2.1 and below, version 6.0.8 and below, version 5.6.12 may allow a remote authenticated attacker to perform a stored cross site scripting attack (XSS). |
6.1 | 2025-03-14 | CVE-2024-26006 | An improper neutralization of input during web page Generation vulnerability [CWE-79] in FortiOS version 7.4.3 and below, version 7.2.7 and below, version 7.0.13 and below and FortiProxy version 7.4.3 and below, version 7.2.9 and below, version 7.0.16 and below web SSL VPN UI may allow a remote unauthenticated attacker to perform a Cross-Site Scripting attack via a malicious samba server. |
0 | 2025-03-11 | CVE-2024-45324 | A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.0 through 7.4.4, version 7.2.0 through 7.2.9, version 7.0.0 through 7.0.15 and before 6.4.15, FortiProxy version 7.4.0 through 7.4.6, version 7.2.0 through 7.2.12 and before 7.0.19, FortiPAM version 1.4.0 through 1.4.2 and before 1.3.1, FortiSRA version 1.4.0 through 1.4.2 and before 1.3.1 and FortiWeb version 7.4.0 through 7.4.5, version 7.2.0 through 7.2.10 and before 7.0.10 allows a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands. |
9.8 | 2025-02-11 | CVE-2025-24472 | An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.2.0 through 7.2.12, 7.0.0 through 7.0.19 may allow a remote attacker to gain super-admin privileges via crafted CSF proxy requests. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
12% (19) | CWE-787 | Out-of-bounds Write |
11% (18) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
5% (9) | CWE-134 | Uncontrolled Format String |
5% (8) | CWE-200 | Information Exposure |
4% (7) | CWE-295 | Certificate Issues |
4% (7) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
3% (5) | CWE-476 | NULL Pointer Dereference |
2% (4) | CWE-345 | Insufficient Verification of Data Authenticity |
2% (4) | CWE-306 | Missing Authentication for Critical Function |
2% (4) | CWE-190 | Integer Overflow or Wraparound |
2% (4) | CWE-20 | Improper Input Validation |
1% (3) | CWE-798 | Use of Hard-coded Credentials |
1% (3) | CWE-613 | Insufficient Session Expiration |
1% (3) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
1% (3) | CWE-312 | Cleartext Storage of Sensitive Information |
1% (3) | CWE-287 | Improper Authentication |
1% (3) | CWE-269 | Improper Privilege Management |
1% (3) | CWE-125 | Out-of-bounds Read |
1% (2) | CWE-770 | Allocation of Resources Without Limits or Throttling |
1% (2) | CWE-436 | Interpretation Conflict |
1% (2) | CWE-300 | Channel Accessible by Non-Endpoint ('Man-in-the-Middle') |
1% (2) | CWE-121 | Stack-based Buffer Overflow |
0% (1) | CWE-755 | Improper Handling of Exceptional Conditions |
0% (1) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
0% (1) | CWE-704 | Incorrect Type Conversion or Cast |
Snort® IPS/IDS
Date | Description |
---|---|
2019-10-10 | Fortigate SSL VPN cross site scripting attempt RuleID : 51470 - Type : SERVER-WEBAPP - Revision : 1 |
2019-10-10 | Fortigate SSL VPN cross site scripting attempt RuleID : 51469 - Type : SERVER-WEBAPP - Revision : 1 |
2019-10-10 | Fortigate SSL VPN cross site scripting attempt RuleID : 51468 - Type : SERVER-WEBAPP - Revision : 1 |
2019-10-10 | Fortigate SSL VPN cross site scripting attempt RuleID : 51467 - Type : SERVER-WEBAPP - Revision : 1 |
2019-10-10 | Fortigate SSL VPN cross site scripting attempt RuleID : 51466 - Type : SERVER-WEBAPP - Revision : 1 |
2019-10-10 | Fortigate SSL VPN cross site scripting attempt RuleID : 51465 - Type : SERVER-WEBAPP - Revision : 1 |
2019-10-01 | Fortinet Fortigate SSL VPN improper authorization attempt RuleID : 51387 - Type : SERVER-WEBAPP - Revision : 1 |
2019-10-01 | Fortigate SSL VPN javascript parsing heap buffer overflow attempt RuleID : 51376 - Type : SERVER-OTHER - Revision : 1 |
2019-10-01 | Fortigate SSL VPN javascript parsing heap buffer overflow attempt RuleID : 51375 - Type : SERVER-OTHER - Revision : 1 |
2019-10-01 | Fortinet FortiOS SSL VPN web portal directory traversal attempt RuleID : 51372 - Type : SERVER-WEBAPP - Revision : 1 |
2019-10-01 | Fortinet FortiOS SSL VPN web portal directory traversal attempt RuleID : 51371 - Type : SERVER-WEBAPP - Revision : 1 |
2019-10-01 | Fortinet FortiOS SSL VPN web portal directory traversal attempt RuleID : 51370 - Type : SERVER-WEBAPP - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-10-05 | Name: The remote host is affected by an information disclosure vulnerability. File: fortios_FG-IR-18-085.nasl - Type: ACT_GATHER_INFO |
2018-06-29 | Name: The remote host is affected by multiple vulnerabilities. File: fortios_FG-IR-18-027.nasl - Type: ACT_GATHER_INFO |