First published: Wed Dec 18 2024(Updated: )
An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] in FortiManager may allow an authenticated remote attacker to execute unauthorized code via FGFM crafted requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiManager | =. | |
Fortinet FortiManager | >=7.4.0<=7.4.4 | |
Fortinet FortiManager | >=7.4.1<=7.4.4 | |
Fortinet FortiManager | >=7.2.3<=7.2.7 | |
Fortinet FortiManager | >=7.2.1<=7.2.7 | |
Fortinet FortiManager | >=7.0.5<=7.0.12 | |
Fortinet FortiManager | >=7.0.1<=7.0.12 | |
Fortinet FortiManager | >=6.4.10<=6.4.14 |
Please upgrade to FortiManager version 7.6.1 or above Please upgrade to FortiManager version 7.4.5 or above Please upgrade to FortiManager version 7.2.8 or above Please upgrade to FortiManager version 7.0.13 or above Please upgrade to FortiManager version 6.4.15 or above Please upgrade to FortiManager Cloud version 7.6.2 or above Please upgrade to FortiManager Cloud version 7.4.5 or above Please upgrade to FortiManager Cloud version 7.2.8 or above Please upgrade to FortiManager Cloud version 7.0.13 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48889 has been classified as a high severity vulnerability due to the potential for remote code execution.
To mitigate CVE-2024-48889, upgrade FortiManager to the appropriate fixed version as specified by Fortinet.
CVE-2024-48889 affects multiple versions of FortiManager, including those from 6.4.10 up to 7.6.1.
Yes, CVE-2024-48889 can be exploited by an authenticated remote attacker through crafted FGFM requests.
CVE-2024-48889 is characterized as an OS Command Injection vulnerability, allowing unauthorized code execution.