First published: Tue Nov 12 2024(Updated: )
A missing authentication for critical function in Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14, FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiSwitchManager version 7.2.0 through 7.2.3, 7.0.0 through 7.0.3, FortiPortal version 6.0.0 through 6.0.14, FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15, 6.2.0 through 6.2.16, 6.0.0 through 6.0.18 allows attacker to execute unauthorized code or commands via specially crafted packets.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | >=6.0.0<7.0.15 | |
FortiOS | >=7.2.0<7.2.8 | |
FortiOS | >=7.4.0<7.4.4 | |
FortiGuard FortiPAM | >=1.0.0<1.3.0 | |
Fortinet FortiProxy SSL VPN webmode | >=1.0.0<7.0.17 | |
Fortinet FortiProxy SSL VPN webmode | >=7.2.0<7.2.10 | |
Fortinet FortiProxy SSL VPN webmode | >=7.4.0<7.4.4 | |
Fortinet FortiManager | >=6.4.0<6.4.15 | |
Fortinet FortiManager | >=7.0.0<7.0.12 | |
Fortinet FortiManager | >=7.2.0<7.2.5 | |
Fortinet FortiManager | >=7.4.0<7.4.3 | |
Fortinet FortiSwitchManager | >=7.0.0<7.0.4 | |
Fortinet FortiSwitchManager | >=7.2.0<7.2.4 | |
Fortinet FortiPortal | >=5.3.0<6.0.15 | |
Fortinet FortiManager | >=7.4.0<=7.4.2 | |
Fortinet FortiManager | >=7.2.0<=7.2.4 | |
Fortinet FortiManager | >=7.0.0<=7.0.11 | |
Fortinet FortiManager | >=6.4.0<=6.4.14 | |
FortiOS | >=7.4.0<=7.4.3 | |
FortiOS | >=7.2.0<=7.2.7 | |
FortiOS | >=7.0.0<=7.0.14 | |
FortiOS | >=6.4 | |
FortiOS | >=6.2 | |
FortiOS | >=6.0 | |
FortiGuard FortiPAM | >=1.2 | |
FortiGuard FortiPAM | >=1.1 | |
FortiGuard FortiPAM | >=1.0 | |
Fortinet FortiPortal | >=6.0.0<=6.0.14 | |
Fortinet FortiPortal | >=5.3 | |
Fortinet FortiProxy SSL VPN webmode | >=7.4.0<=7.4.3 | |
Fortinet FortiProxy SSL VPN webmode | >=7.2.0<=7.2.9 | |
Fortinet FortiProxy SSL VPN webmode | >=7.0.0<=7.0.16 | |
Fortinet FortiProxy SSL VPN webmode | >=2.0 | |
Fortinet FortiProxy SSL VPN webmode | >=1.2 | |
Fortinet FortiProxy SSL VPN webmode | >=1.1 | |
Fortinet FortiProxy SSL VPN webmode | >=1.0 | |
Fortinet FortiSwitchManager | >=7.2.0<=7.2.3 | |
Fortinet FortiSwitchManager | >=7.0.0<=7.0.3 |
Please upgrade to FortiManager version 7.4.3 or above Please upgrade to FortiManager version 7.2.5 or above Please upgrade to FortiManager version 7.0.12 or above Please upgrade to FortiManager version 6.4.15 or above Please upgrade to FortiVoice version 7.0.2 or above Please upgrade to FortiVoice version 6.4.9 or above Please upgrade to FortiSwitchManager version 7.2.4 or above Please upgrade to FortiSwitchManager version 7.0.4 or above Please upgrade to FortiWeb version 7.6.0 or above Please upgrade to FortiWeb version 7.4.3 or above Please upgrade to FortiPAM version 1.3.0 or above Please upgrade to FortiAuthenticator version 7.0.0 or above Please upgrade to FortiProxy version 7.4.4 or above Please upgrade to FortiProxy version 7.2.10 or above Please upgrade to FortiPortal version 6.0.15 or above Please upgrade to FortiOS version 7.6.0 or above Please upgrade to FortiOS version 7.4.4 or above Please upgrade to FortiOS version 7.2.8 or above Please upgrade to FortiOS version 7.0.15 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-26011 is critical due to the missing authentication for critical functions.
To fix CVE-2024-26011, upgrade FortiManager to version 7.4.3 or later, FortiOS to 7.4.4 or later, or FortiProxy to version 7.4.4 or later.
CVE-2024-26011 affects multiple versions of FortiManager, FortiPAM, FortiProxy, and FortiOS between specific version ranges.
You can determine vulnerability by checking if your Fortinet product version matches any of the affected versions listed in CVE-2024-26011.
There are no known workarounds for CVE-2024-26011, so upgrading to the latest version is recommended as the only mitigation.