First published: Fri Mar 14 2025(Updated: )
An improper validation of integrity check value vulnerability [CWE-354] in FortiNDR version 7.4.2 and below, version 7.2.1 and below, version 7.1.1 and below, version 7.0.6 and below may allow an authenticated attacker with at least Read/Write permission on system maintenance to install a corrupted firmware image.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
FortiNDR | <7.4.2<7.2.1<7.1.1<7.0.6 |
Please upgrade to FortiNDR version 7.4.3 or above Please upgrade to FortiNDR version 7.2.2 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47573 is classified as a medium severity vulnerability due to its potential exploitation by authenticated attackers.
To fix CVE-2024-47573, users must upgrade to FortiNDR version 7.4.3 or later, or any version above 7.2.2, 7.1.2, and 7.0.7.
Any user of FortiNDR versions 7.4.2 and below, 7.2.1 and below, 7.1.1 and below, and 7.0.6 and below is affected by CVE-2024-47573.
CVE-2024-47573 requires authentication and specific read/write permissions, making it unlikely to be exploited remotely by unauthorized users.
The main impact of CVE-2024-47573 is that it may allow authenticated attackers to install corrupted updates or modifications on the affected FortiNDR systems.