First published: Tue Jan 14 2025(Updated: )
A relative path traversal vulnerability [CWE-23] in FortiManager administrative interface may allow a privileged attacker to delete files from the underlying filesystem via crafted HTTP or HTTPs requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiManager | >=7.4.0<=7.4.2 | |
Fortinet FortiManager | >=7.2.0<=7.2.5 | |
Fortinet FortiManager | >=7.0 |
Please upgrade to FortiManager version 7.4.3 or above Please upgrade to FortiManager version 7.2.6 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32115 has been classified as a high severity vulnerability due to the potential for a privileged attacker to delete critical files.
To remediate CVE-2024-32115, upgrade FortiManager to version 7.4.3 or 7.2.6 or later.
CVE-2024-32115 affects Fortinet FortiManager versions 7.4.0 to 7.4.2 and 7.2.0 to 7.2.5, as well as versions from 7.0 upwards.
CVE-2024-32115 is a relative path traversal vulnerability that can lead to unauthorized file deletion.
Yes, CVE-2024-32115 can be exploited remotely through crafted HTTP or HTTPS requests.