First published: Tue Feb 11 2025(Updated: )
An incorrect privilege assignment vulnerability [CWE-266] in Fortinet FortiOS version 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.9 and before 7.0.15 allows an authenticated admin whose access profile has the Security Fabric permission to escalate their privileges to super-admin by connecting the targetted FortiGate to a malicious upstream FortiGate they control.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.4.0<7.4.5>=7.2.0<7.3.0<7.0.15 | |
Fortinet FortiOS IPS Engine | =. | |
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.4 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.9 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.15 | |
Fortinet FortiOS IPS Engine | >=6.4 |
Please upgrade to FortiOS version 7.6.1 or above Please upgrade to FortiOS version 7.4.5 or above Please upgrade to FortiOS version 7.2.10 or above Please upgrade to FortiOS version 7.0.16 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-40591 is classified as a high severity vulnerability due to the potential for privilege escalation.
To address CVE-2024-40591, update Fortinet FortiOS to version 7.4.5 or later, 7.3.0 or later, or 7.0.15 or later.
CVE-2024-40591 affects users of Fortinet FortiOS versions 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.9, and versions before 7.0.15.
CVE-2024-40591 is an incorrect privilege assignment vulnerability, allowing unauthorized privilege escalation.
Exploitation of CVE-2024-40591 allows an authenticated admin to escalate their privileges to super-admin status, potentially compromising system security.