First published: Tue Jan 14 2025(Updated: )
A weak authentication in Fortinet FortiOS versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, FortiProxy versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3 allows attacker to execute unauthorized code or commands via a brute-force attack.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.4>=7.2.0<=7.2.8>=7.0.0<=7.0.15>=6.4.0<=6.4.15 | |
Fortinet FortiProxy | >=7.4.0<=7.4.4>=7.2.0<=7.2.10>=7.0.0<=7.0.17>=2.0.0<=2.0.14 | |
Fortinet FortiManager | >=7.6.0<=7.6.1>=7.4.1<=7.4.3 | |
Fortinet FortiManager Cloud | >=7.4.1<=7.4.3 | |
Fortinet FortiAnalyzer Cloud | >=7.4.1<=7.4.3 | |
Fortinet FortiAnalyzer | >=7.4.1<7.4.4 | |
Fortinet FortiAnalyzer | >=7.6.0<7.6.2 | |
Fortinet FortiAnalyzer Cloud | >=7.4.1<7.4.4 | |
Fortinet FortiManager | >=7.4.1<7.4.4 | |
Fortinet FortiManager | >=7.6.0<7.6.2 | |
Fortinet FortiManager Cloud | >=7.4.1<7.4.4 | |
Fortinet FortiProxy | >=2.0.0<2.0.15 | |
Fortinet FortiProxy | >=7.0.0<7.0.18 | |
Fortinet FortiProxy | >=7.2.0<7.2.11 | |
Fortinet FortiProxy | >=7.4.0<7.4.5 | |
Fortinet FortiOS IPS Engine | >=6.4.0<7.0.16 | |
Fortinet FortiOS IPS Engine | >=7.2.0<7.2.9 | |
Fortinet FortiOS IPS Engine | >=7.4.0<7.4.5 |
Please upgrade to FortiManager Cloud version 7.6.2 or above Please upgrade to FortiManager Cloud version 7.4.4 or above Please upgrade to FortiOS version 7.6.0 or above Please upgrade to FortiOS version 7.4.5 or above Please upgrade to FortiOS version 7.2.9 or above Please upgrade to FortiOS version 7.0.16 or above Please upgrade to FortiAnalyzer version 7.6.2 or above Please upgrade to FortiAnalyzer version 7.4.4 or above Please upgrade to FortiAnalyzer Cloud version 7.6.2 or above Please upgrade to FortiAnalyzer Cloud version 7.4.4 or above Please upgrade to FortiManager version 7.6.2 or above Please upgrade to FortiManager version 7.4.4 or above Please upgrade to FortiAuthenticator version 7.0.0 or above Please upgrade to FortiProxy version 7.4.5 or above Please upgrade to FortiProxy version 7.2.11 or above Please upgrade to FortiProxy version 7.0.18 or above Please upgrade to FortiProxy version 2.0.15 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48886 is rated as a critical vulnerability due to weak authentication in multiple Fortinet products.
To fix CVE-2024-48886, upgrade Fortinet FortiOS, FortiProxy, or FortiManager to the latest patched versions.
CVE-2024-48886 affects Fortinet FortiOS versions 7.4.0 through 7.4.4, among others, as well as FortiProxy and FortiManager in specified versions.
The impacted products include Fortinet FortiOS, FortiProxy, FortiManager, FortiManager Cloud, and FortiAnalyzer Cloud.
Yes, user intervention is required to mitigate CVE-2024-48886 by applying the recommended software updates.