First published: Tue Nov 12 2024(Updated: )
Multiple relative path traversal vulnerabilities [CWE-23] in FortiManager, FortiAnalyzer & FortiAnalyzer-BigData may allow a privileged attacker to delete files from the underlying filesystem via crafted CLI requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=6.2.0<7.2.6 | |
Fortinet FortiAnalyzer | >=7.4.0<7.4.3 | |
Fortinet FortiAnalyzer BigData | >=6.2.1<7.2.8 | |
Fortinet FortiAnalyzer BigData | =7.4.0 | |
Fortinet FortiManager | >=6.2.0<7.2.6 | |
Fortinet FortiManager | >=7.4.0<7.4.3 | |
Fortinet FortiAnalyzer | >=7.4.0<=7.4.2 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.5 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2 | |
Fortinet FortiAnalyzer | =. | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.7 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiAnalyzer | >=6.2 | |
Fortinet FortiManager | >=7.4.0<=7.4.2 | |
Fortinet FortiManager | >=7.2.0<=7.2.5 | |
Fortinet FortiManager | >=7.0 | |
Fortinet FortiManager | >=6.4 | |
Fortinet FortiManager | >=6.2 |
Please upgrade to FortiAnalyzer version 7.4.3 or above Please upgrade to FortiAnalyzer version 7.2.6 or above Please upgrade to FortiManager version 7.4.3 or above Please upgrade to FortiManager version 7.2.6 or above Please upgrade to FortiAnalyzer-BigData version 7.4.1 or above Please upgrade to FortiAnalyzer-BigData version 7.2.8 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32116 has a high severity rating due to its potential to allow privileged attackers to delete files from the filesystem.
To fix CVE-2024-32116, upgrade FortiManager and FortiAnalyzer to version 7.4.3 or later, or follow recommended remediation steps for affected versions.
CVE-2024-32116 affects FortiAnalyzer and FortiManager versions specifically between 6.2.0 and 7.4.2.
Mitigation may be limited, but implementing strict access controls could reduce the likelihood of exploitation.
While there are no public reports of active exploitation of CVE-2024-32116, its vulnerabilities create a significant risk for affected systems.