First published: Tue Apr 08 2025(Updated: )
A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a specially crafted request
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSwitch | =. | |
Fortinet FortiSwitch | >=7.4.0<=7.4.4 | |
Fortinet FortiSwitch | >=7.2.0<=7.2.8 | |
Fortinet FortiSwitch | >=7.0.0<=7.0.10 | |
Fortinet FortiSwitch | >=6.4.0<=6.4.14 |
Please upgrade to FortiSwitch version 7.6.1 or above Please upgrade to FortiSwitch version 7.4.5 or above Please upgrade to FortiSwitch version 7.2.9 or above Please upgrade to FortiSwitch version 7.0.11 or above Please upgrade to FortiSwitch version 6.4.15 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-48887 has been classified as a high-severity vulnerability due to its potential to allow unauthorized password changes by remote attackers.
To mitigate CVE-2024-48887, you should upgrade your FortiSwitch to the latest version that is not affected by this vulnerability.
FortiSwitch versions prior to 7.6.1 and those in the ranges 7.4.0 to 7.4.4, 7.2.0 to 7.2.8, 7.0.0 to 7.0.10, and 6.4.0 to 6.4.14 are affected by CVE-2024-48887.
Yes, CVE-2024-48887 can be exploited remotely by an unauthenticated attacker who sends a specially crafted request.
CVE-2024-48887 is classified as an unverified password change vulnerability (CWE-620) affecting the FortiSwitch GUI.