First published: Tue Jul 09 2024(Updated: )
An incorrect parsing of numbers with different radices vulnerability [CWE-1389] in FortiOS and FortiProxy IP address validation feature may permit an unauthenticated attacker to bypass the IP blocklist via crafted requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiProxy | >=7.0.0<=7.4.3 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.15 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.8 | |
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.3 | |
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.3 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.8 | |
Fortinet FortiOS IPS Engine | >=7.0 | |
Fortinet FortiProxy | >=7.4.0<=7.4.3 | |
Fortinet FortiProxy | >=7.2 | |
Fortinet FortiProxy | >=7.0 |
Please upgrade to FortiProxy version 7.4.4 or above Please upgrade to FortiOS version 7.6.0 or above Please upgrade to FortiOS version 7.4.4 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26015 has a medium severity due to its potential to allow unauthorized access through IP blocklist bypass.
To remediate CVE-2024-26015, upgrade FortiOS and FortiProxy to version 7.4.4 or 7.2.9 or later.
CVE-2024-26015 affects FortiOS versions from 7.0 to 7.4.3 and FortiProxy from 7.0 to 7.4.3.
Yes, CVE-2024-26015 can be exploited remotely by an unauthenticated attacker.
CVE-2024-26015 is classified as an incorrect parsing of numbers with different radices vulnerability.