First published: Tue Jan 14 2025(Updated: )
An operation on a resource after expiration or release in Fortinet FortiManager 6.4.12 through 7.4.0 allows an attacker to gain improper access to FortiGate via valid credentials.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiManager | =. | |
Fortinet FortiManager | =. | |
Fortinet FortiManager | >=7.0.7<=7.0.8 | |
Fortinet FortiManager | =. | |
Fortinet FortiManager | >=7.0.7<7.0.9 | |
Fortinet FortiManager | =6.4.12 | |
Fortinet FortiManager | =7.2.3 | |
Fortinet FortiManager | =7.4.0 |
Please upgrade to FortiManager version 7.4.1 or above Please upgrade to FortiManager version 7.2.4 or above Please upgrade to FortiManager version 7.0.9 or above Please upgrade to FortiManager version 6.4.13 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47571 is classified as a medium-severity vulnerability that allows improper access to FortiGate via valid credentials.
To fix CVE-2024-47571, upgrade FortiManager to version 7.4.1 or later, 7.2.4 or later, 6.4.13 or later, or ensure you are on version 7.0.9 in the defined safe range.
Affected versions of FortiManager range from 6.4.12 through 7.4.0.
CVE-2024-47571 is an operation on a resource after expiration or release vulnerability, categorized under CWE-672.
Yes, exploiting CVE-2024-47571 can grant an attacker improper access to FortiGate resources using valid credentials.