First published: Tue Jan 14 2025(Updated: )
A relative path traversal vulnerability [CWE-23] in FortiManager & FortiAnalyzer may allow a privileged attacker with super-admin profile and CLI access to write files on the underlying system via crafted HTTP or HTTPS requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.4.0<=7.4.3 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.5 | |
Fortinet FortiAnalyzer | >=7.0.2<=7.0.12 | |
Fortinet FortiAnalyzer | >=6.2.10<=6.2.13 | |
Fortinet FortiManager | >=7.4.0<=7.4.3 | |
Fortinet FortiManager | >=7.2.0<=7.2.5 | |
Fortinet FortiManager | >=7.0.2<=7.0.12 | |
Fortinet FortiManager | >=6.2.10<=6.2.13 | |
Fortinet FortiAnalyzer | >=6.2.10<7.0.13 | |
Fortinet FortiAnalyzer | >=7.2.0<7.2.6 | |
Fortinet FortiAnalyzer | >=7.4.0<7.4.4 | |
Fortinet FortiManager | >=6.2.10<7.0.13 | |
Fortinet FortiManager | >=7.2.0<7.2.6 | |
Fortinet FortiManager | >=7.4.0<7.4.4 |
Please upgrade to FortiManager version 7.6.0 or above Please upgrade to FortiManager version 7.4.4 or above Please upgrade to FortiManager version 7.2.6 or above Please upgrade to FortiManager version 7.0.13 or above Please upgrade to FortiAnalyzer version 7.6.0 or above Please upgrade to FortiAnalyzer version 7.4.4 or above Please upgrade to FortiAnalyzer version 7.2.6 or above Please upgrade to FortiAnalyzer version 7.0.13 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36512 has a severity rating that allows a privileged attacker to exploit a relative path traversal vulnerability.
To fix CVE-2024-36512, upgrade FortiManager or FortiAnalyzer to version 7.4.4 or later, 7.2.6 or later, or 7.0.13 or later.
CVE-2024-36512 affects FortiManager and FortiAnalyzer versions 6.2.10 up to 7.4.3.
Privileged attackers with super-admin profiles and CLI access are at risk of exploiting CVE-2024-36512.
CVE-2024-36512 is classified as a relative path traversal vulnerability.