This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Fortinet First view 2013-06-25
Product Fortios Last view 2025-07-15
Version 4.2.4 Type Os
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:fortinet:fortios

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
6.7 2025-07-15 CVE-2025-24477

A heap-based buffer overflow in Fortinet FortiOS versions 7.6.0 through 7.6.2, 7.4.0 through 7.4.7, 7.2.4 through 7.2.11 allows an attacker to escalate its privileges via a specially crafted CLI command

3.7 2025-05-28 CVE-2025-47295

A buffer over-read in Fortinet FortiOS versions 7.4.0 through 7.4.3, versions 7.2.0 through 7.2.7, and versions 7.0.0 through 7.0.14 may allow a remote unauthenticated attacker to crash the FGFM daemon via a specially crafted request, under rare conditions that are outside of the attacker's control.

5.3 2025-05-28 CVE-2025-47294

A integer overflow or wraparound in Fortinet FortiOS versions 7.2.0 through 7.2.7, versions 7.0.0 through 7.0.14 may allow a remote unauthenticated attacker to crash the csfd daemon via a specially crafted request.

7.2 2025-05-28 CVE-2025-22252

A missing authentication for critical function in Fortinet FortiProxy versions 7.6.0 through 7.6.1, FortiSwitchManager version 7.2.5, and FortiOS versions 7.4.4 through 7.4.6 and version 7.6.0 may allow an attacker with knowledge of an existing admin account to access the device as a valid admin via an authentication bypass.

4.4 2025-04-08 CVE-2024-32122

A storing passwords in a recoverable format in Fortinet FortiOS versions 7.2.0 through 7.2.1 allows attacker to information disclosure via modification of LDAP server IP to point to a malicious server.

9.8 2025-02-11 CVE-2025-24472

AnĀ Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.2.0 through 7.2.12, 7.0.0 through 7.0.19 may allow a remote attacker to gain super-admin privileges via crafted CSF proxy requests.

7.2 2025-02-11 CVE-2024-40591

An incorrect privilege assignment vulnerability [CWE-266] in Fortinet FortiOS version 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.9 and before 7.0.15 allows an authenticated admin whose access profile has the Security Fabric permission to escalate their privileges to super-admin by connecting the targetted FortiGate to a malicious upstream FortiGate they control.

0 2025-02-11 CVE-2024-35279

A stack-based buffer overflow [CWE-121] vulnerability in Fortinet FortiOS version 7.2.4 through 7.2.8 and version 7.4.0 through 7.4.4 allows a remote unauthenticated attacker to execute arbitrary code or commands via crafted UDP packets through the CAPWAP control, provided the attacker were able to evade FortiOS stack protections and provided the fabric service is running on the exposed interface.

6.1 2025-01-22 CVE-2022-23439

A externally controlled reference to a resource in another sphere in Fortinet FortiManager before version 7.4.3, FortiMail before version 7.0.3, FortiAnalyzer before version 7.4.3, FortiVoice version 7.0.0, 7.0.1 and before 6.4.8, FortiProxy before version 7.0.4, FortiRecorder version 6.4.0 through 6.4.2 and before 6.0.10, FortiAuthenticator version 6.4.0 through 6.4.1 and before 6.3.3, FortiNDR version 7.2.0 before 7.1.0, FortiWLC before version 8.6.4, FortiPortal before version 6.0.9, FortiOS version 7.2.0 and before 7.0.5, FortiADC version 7.0.0 through 7.0.1 and before 6.2.3 , FortiDDoS before version 5.5.1, FortiDDoS-F before version 6.3.3, FortiTester before version 7.2.1, FortiSOAR before version 7.2.2 and FortiSwitch before version 6.3.3 allows attacker to poison web caches via crafted HTTP requests, where the `Host` header points to an arbitrary webserver

9.8 2025-01-16 CVE-2024-50563

A weak authentication in Fortinet FortiManager Cloud, FortiAnalyzer versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3 allows attacker to execute unauthorized code or commands via a brute-force attack.

9.1 2025-01-16 CVE-2024-48885

A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiRecorder versions 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiWeb versions 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.10, 6.4.0 through 6.4.3, FortiVoice versions 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.0 through 6.0.12 allows attacker to escalate privilege via specially crafted packets.

9.8 2025-01-14 CVE-2024-55591

AnĀ Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests toĀ Node.js websocket module.

9.8 2025-01-14 CVE-2024-54021

An improper neutralization of crlf sequences in http headers ('http response splitting') in Fortinet FortiOS 7.2.0 through 7.6.0, FortiProxy 7.2.0 through 7.4.5 allows attacker to execute unauthorized code or commands via crafted HTTP header.

5.9 2025-01-14 CVE-2024-52963

A out-of-bounds write in Fortinet FortiOS versions 7.6.0, 7.4.0 through 7.4.6, 7.2.0 through 7.2.10, 7.0.0 through 7.0.16, 6.4.0 through 6.4.15 allows attacker to trigger a denial of service via specially crafted packets.

9.8 2025-01-14 CVE-2024-48886

A weak authentication in Fortinet FortiOS versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, FortiProxy versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3 allows attacker to execute unauthorized code or commands via a brute-force attack.

9.1 2025-01-14 CVE-2024-48884

A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiOS versions 7.6.0, 7.4.0 through 7.4.4, 7.2.5 through 7.2.9, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, FortiProxy 7.4.0 through 7.4.5, 7.2.0 through 7.2.11, 7.0.0 through 7.0.18, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiManager Cloud versions 7.4.1 through 7.4.3 allows attacker to trigger an escalation of privilege via specially crafted packets.

7.5 2025-01-14 CVE-2024-46670

AnĀ Out-of-bounds Read vulnerability [CWE-125] in FortiOS version 7.6.0, version 7.4.4 and below, version 7.2.9 and below and FortiSASE FortiOS tenant version 24.3.b IPsec IKE service may allow an unauthenticated remote attacker to trigger memory consumption leading to Denial of Service via crafted requests.

6.5 2025-01-14 CVE-2024-46669

AnĀ Integer Overflow or Wraparound vulnerability [CWE-190] in version 7.4.4 and below, version 7.2.10 and below; FortiSASE version 23.4.b FortiOS tenant IPsec IKE service may allow an authenticated attacker to crash the IPsec tunnel via crafted requests, resulting in potential denial of service.

7.5 2025-01-14 CVE-2024-46668

An allocation of resources without limits or throttling vulnerability [CWE-770] in FortiOS versions 7.4.0 through 7.4.4, versions 7.2.0 through 7.2.8, versions 7.0.0 through 7.0.15, and versions 6.4.0 through 6.4.15 may allow an unauthenticated remote user to consume all system memory via multiple large file uploads.

3.7 2025-01-14 CVE-2024-46665

An insertion of sensitive information into sent data vulnerability [CWE-201] in FortiOS 7.6.0, 7.4.0 through 7.4.4 may allow an attacker in a man-in-the-middle position to retrieve the RADIUS accounting server shared secret via intercepting accounting-requests.

4.3 2025-01-14 CVE-2023-46715

An origin validation error [CWE-346] vulnerability in Fortinet FortiOS IPSec VPN version 7.4.0 through 7.4.1 and version 7.2.6 and below allows an authenticated IPSec VPN user with dynamic IP addressing to send (but not receive) packets spoofing the IP of another user via crafted network packets.

6.5 2025-01-14 CVE-2023-42786

A null pointer dereference in FortiOS versions 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0 all versions, 6.4 all versions , 6.2 all versions and 6.0 all versions allows attacker to trigger a denial of service via a crafted http request.

6.5 2025-01-14 CVE-2023-42785

A null pointer dereference in FortiOS versions 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0 all versions, 6.4 all versions , 6.2 all versions and 6.0 all versions allows attacker to trigger a denial of service via a crafted http request.

8.8 2024-12-19 CVE-2020-12820

Under non-default configuration, a stack-based buffer overflow in FortiOS version 6.0.10 and below, version 5.6.12 and below may allow a remote attacker authenticated to the SSL VPN to crash the FortiClient NAC daemon (fcnacd) and potentially execute arbitrary code via requesting a large FortiClient file name. We are not aware of proof of concept code successfully achieving the latter.

7.5 2024-12-19 CVE-2020-12819

A heap-based buffer overflow vulnerability in the processing of Link Control Protocol messages in FortiGate versions 5.6.12, 6.0.10, 6.2.4 and 6.4.1 and earlier may allow a remote attacker with valid SSL VPN credentials to crash the SSL VPN daemon by sending a large LCP packet, when tunnel mode is enabled. Arbitrary code execution may be theoretically possible, albeit practically very difficult to achieve in this context

CWE : Common Weakness Enumeration

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
13% (20) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
12% (19) CWE-787 Out-of-bounds Write
6% (10) CWE-200 Information Exposure
4% (7) CWE-134 Uncontrolled Format String
4% (7) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
4% (6) CWE-295 Certificate Issues
3% (5) CWE-476 NULL Pointer Dereference
3% (5) CWE-20 Improper Input Validation
2% (4) CWE-345 Insufficient Verification of Data Authenticity
2% (4) CWE-306 Missing Authentication for Critical Function
2% (3) CWE-798 Use of Hard-coded Credentials
2% (3) CWE-601 URL Redirection to Untrusted Site ('Open Redirect')
2% (3) CWE-312 Cleartext Storage of Sensitive Information
2% (3) CWE-287 Improper Authentication
2% (3) CWE-269 Improper Privilege Management
2% (3) CWE-190 Integer Overflow or Wraparound
1% (2) CWE-613 Insufficient Session Expiration
1% (2) CWE-436 Interpretation Conflict
1% (2) CWE-264 Permissions, Privileges, and Access Controls
1% (2) CWE-203 Information Exposure Through Discrepancy
1% (2) CWE-125 Out-of-bounds Read
1% (2) CWE-121 Stack-based Buffer Overflow
1% (2) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
0% (1) CWE-770 Allocation of Resources Without Limits or Throttling
0% (1) CWE-755 Improper Handling of Exceptional Conditions

SAINT Exploits

Description Link
FortiOS Fortimanager_Access SSH account backdoor More info here

ExploitDB Exploits

id Description
26528 Fortigate Firewalls - CSRF Vulnerability

SnortĀ® IPS/IDS

Date Description
2019-10-10 Fortigate SSL VPN cross site scripting attempt
RuleID : 51470 - Type : SERVER-WEBAPP - Revision : 1
2019-10-10 Fortigate SSL VPN cross site scripting attempt
RuleID : 51469 - Type : SERVER-WEBAPP - Revision : 1
2019-10-10 Fortigate SSL VPN cross site scripting attempt
RuleID : 51468 - Type : SERVER-WEBAPP - Revision : 1
2019-10-10 Fortigate SSL VPN cross site scripting attempt
RuleID : 51467 - Type : SERVER-WEBAPP - Revision : 1
2019-10-10 Fortigate SSL VPN cross site scripting attempt
RuleID : 51466 - Type : SERVER-WEBAPP - Revision : 1
2019-10-10 Fortigate SSL VPN cross site scripting attempt
RuleID : 51465 - Type : SERVER-WEBAPP - Revision : 1
2019-10-01 Fortinet Fortigate SSL VPN improper authorization attempt
RuleID : 51387 - Type : SERVER-WEBAPP - Revision : 1
2019-10-01 Fortigate SSL VPN javascript parsing heap buffer overflow attempt
RuleID : 51376 - Type : SERVER-OTHER - Revision : 1
2019-10-01 Fortigate SSL VPN javascript parsing heap buffer overflow attempt
RuleID : 51375 - Type : SERVER-OTHER - Revision : 1
2019-10-01 Fortinet FortiOS SSL VPN web portal directory traversal attempt
RuleID : 51372 - Type : SERVER-WEBAPP - Revision : 1
2019-10-01 Fortinet FortiOS SSL VPN web portal directory traversal attempt
RuleID : 51371 - Type : SERVER-WEBAPP - Revision : 1
2019-10-01 Fortinet FortiOS SSL VPN web portal directory traversal attempt
RuleID : 51370 - Type : SERVER-WEBAPP - Revision : 1
2018-02-08 Fortinet FortiOS redir parameter cross site scripting attempt
RuleID : 45401 - Type : SERVER-WEBAPP - Revision : 2
2016-10-20 Fortigate Firewall HTTP cookie buffer overflow
RuleID : 40241 - Type : SERVER-OTHER - Revision : 2

NessusĀ® Vulnerability Scanner

id Description
2018-12-05 Name: The remote host is affected by an information disclosure vulnerability.
File: fortios_FG-IR-18-325.nasl - Type: ACT_GATHER_INFO
2018-10-05 Name: The remote host is affected by an information disclosure vulnerability.
File: fortios_FG-IR-18-085.nasl - Type: ACT_GATHER_INFO
2018-06-29 Name: The remote host is affected by multiple vulnerabilities.
File: fortios_FG-IR-18-027.nasl - Type: ACT_GATHER_INFO
2018-06-08 Name: The remote host is affected by multiple vulnerabilities.
File: fortios_FG-IR-17-245.nasl - Type: ACT_GATHER_INFO
2018-02-02 Name: The remote host is affected by a cross-site scripting vulnerability.
File: fortios_FG-IR-17-262.nasl - Type: ACT_GATHER_INFO
2017-11-30 Name: The remote host is affected by a cross-site scripting vulnerability.
File: fortios_FG-IR-17-242.nasl - Type: ACT_GATHER_INFO
2017-08-02 Name: The remote host is affected by multiple vulnerabilities.
File: fortios_FG-IR-17-104.nasl - Type: ACT_GATHER_INFO
2016-12-01 Name: The remote host is affected by an information disclosure vulnerability.
File: fortios_CVE-2016-8492.nasl - Type: ACT_GATHER_INFO
2016-08-29 Name: A web-based management console running on the remote host is affected by a re...
File: fortios_cookie_parsing_bof.nasl - Type: ACT_DESTRUCTIVE_ATTACK
2016-08-26 Name: The remote host is affected by a remote code execution vulnerability.
File: fortios_FG-IR-16-023.nasl - Type: ACT_GATHER_INFO
2016-01-13 Name: The SSH server running on the remote host can be logged into using default SS...
File: fortios_ssh_backdoor.nasl - Type: ACT_ATTACK
2015-09-23 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201508-01.nasl - Type: ACT_GATHER_INFO
2015-09-04 Name: The remote host is affected by a man-in-the-middle spoofing vulnerability.
File: fortios_ssl_vpn_tls_mac_mitm.nasl - Type: ACT_GATHER_INFO
2014-09-30 Name: The remote host is affected by multiple vulnerabilities.
File: fortios_FG-IR-14-006.nasl - Type: ACT_GATHER_INFO
2014-04-15 Name: The remote host is affected by a security bypass vulnerability.
File: fortios_FGA-2013-20.nasl - Type: ACT_GATHER_INFO
2014-04-15 Name: The remote host is affected by multiple cross-site request forgery vulnerabil...
File: fortios_FGA-2013-22.nasl - Type: ACT_GATHER_INFO