First published: Thu Jan 16 2025(Updated: )
A weak authentication in Fortinet FortiManager Cloud, FortiAnalyzer versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3 allows attacker to execute unauthorized code or commands via a brute-force attack.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiManager | >=7.6.0<=7.6.1>=7.4.1<=7.4.3 | |
Fortinet FortiAnalyzer | >=7.6.0<=7.6.1>=7.4.1<=7.4.3 | |
Fortinet FortiAnalyzer Cloud | >=7.4.1<=7.4.3 | |
Fortinet FortiManager Cloud | >=7.4.1<=7.4.3 | |
Fortinet FortiAnalyzer | >=7.4.1<7.4.4 | |
Fortinet FortiAnalyzer | >=7.6.0<7.6.2 | |
Fortinet FortiAnalyzer Cloud | >=7.4.1<7.4.4 | |
Fortinet FortiManager | >=7.4.1<7.4.4 | |
Fortinet FortiManager | >=7.6.0<7.6.2 | |
Fortinet FortiManager Cloud | >=7.4.1<7.4.4 | |
Fortinet FortiProxy | >=2.0.0<2.0.15 | |
Fortinet FortiProxy | >=7.0.0<7.0.18 | |
Fortinet FortiProxy | >=7.2.0<7.2.11 | |
Fortinet FortiProxy | >=7.4.0<7.4.5 | |
Fortinet FortiOS IPS Engine | >=6.4.0<7.0.16 | |
Fortinet FortiOS IPS Engine | >=7.2.0<7.2.9 | |
Fortinet FortiOS IPS Engine | >=7.4.0<7.4.5 |
Please upgrade to FortiManager Cloud version 7.6.2 or above Please upgrade to FortiManager Cloud version 7.4.4 or above Please upgrade to FortiOS version 7.6.0 or above Please upgrade to FortiOS version 7.4.5 or above Please upgrade to FortiOS version 7.2.9 or above Please upgrade to FortiOS version 7.0.16 or above Please upgrade to FortiAnalyzer version 7.6.2 or above Please upgrade to FortiAnalyzer version 7.4.4 or above Please upgrade to FortiAnalyzer Cloud version 7.6.2 or above Please upgrade to FortiAnalyzer Cloud version 7.4.4 or above Please upgrade to FortiManager version 7.6.2 or above Please upgrade to FortiManager version 7.4.4 or above Please upgrade to FortiAuthenticator version 7.0.0 or above Please upgrade to FortiProxy version 7.4.5 or above Please upgrade to FortiProxy version 7.2.11 or above Please upgrade to FortiProxy version 7.0.18 or above Please upgrade to FortiProxy version 2.0.15 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50563 is considered a high severity vulnerability due to its weak authentication issue.
To fix CVE-2024-50563, upgrade Fortinet FortiManager and FortiAnalyzer to the latest versions as listed in the security advisory.
CVE-2024-50563 affects Fortinet FortiManager and FortiAnalyzer versions 7.6.0 to 7.6.1 and 7.4.1 to 7.4.3.
The impact of CVE-2024-50563 allows an attacker to bypass authentication mechanisms.
There are no official workarounds provided for CVE-2024-50563, so applying the necessary updates is recommended.