First published: Tue Apr 08 2025(Updated: )
A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15 and 6.2.0 through 6.2.16, Fortinet FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.15 and 2.0.0 through 2.0.14, Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and 6.2.0 through 6.2.13, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and 6.2.0 through 6.2.13, Fortinet FortiVoice version 7.0.0 through 7.0.2, 6.4.0 through 6.4.8 and 6.0.0 through 6.0.12 and Fortinet FortiWeb version 7.4.0 through 7.4.2, 7.2.0 through 7.2.10, 7.0.0 through 7.0.10 allows an unauthenticated attacker in a man-in-the-middle position to impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager), via intercepting the FGFM authentication request between the management device and the managed device
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.4.0<=7.4.2 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.4 | |
Fortinet FortiAnalyzer | >=7.0.0<=7.0.11 | |
Fortinet FortiAnalyzer | >=6.4.0<=6.4.14 | |
Fortinet FortiAnalyzer | >=6.2.0<=6.2.13 | |
Fortinet FortiManager | >=7.4.0<=7.4.2 | |
Fortinet FortiManager | >=7.2.0<=7.2.4 | |
Fortinet FortiManager | >=7.0.0<=7.0.11 | |
Fortinet FortiManager | >=6.4.0<=6.4.14 | |
Fortinet FortiManager | >=6.2.0<=6.2.13 | |
FortiOS | >=7.4.0<=7.4.4 | |
FortiOS | >=7.2.0<=7.2.8 | |
FortiOS | >=7.0.0<=7.0.15 | |
FortiOS | >=6.4 | |
FortiOS | >=6.2.0<=6.2.16 | |
Fortinet FortiProxy SSL VPN webmode | >=7.4.0<=7.4.2 | |
Fortinet FortiProxy SSL VPN webmode | >=7.2.0<=7.2.9 | |
Fortinet FortiProxy SSL VPN webmode | >=7.0.0<=7.0.15 | |
Fortinet FortiProxy SSL VPN webmode | >=2.0 | |
Fortinet FortiVoice Enterprise | >=7.0.0<=7.0.2 | |
Fortinet FortiVoice Enterprise | >=6.4.0<=6.4.8 | |
Fortinet FortiVoice Enterprise | >=6.0 | |
Fortinet FortiWeb | >=7.4.0<=7.4.2 | |
Fortinet FortiWeb | >=7.2 | |
Fortinet FortiWeb | >=7.0 |
Please upgrade to FortiProxy version 7.4.3 or above Please upgrade to FortiProxy version 7.2.10 or above Please upgrade to FortiProxy version 7.0.16 or above Please upgrade to FortiOS version 7.6.0 or above Please upgrade to FortiOS version 7.4.5 or above Please upgrade to FortiOS version 7.2.9 or above Please upgrade to FortiOS version 7.0.16 or above Please upgrade to FortiOS version 6.2.17 or above Please upgrade to FortiVoice version 7.2.0 or above Please upgrade to FortiVoice version 7.0.3 or above Please upgrade to FortiVoice version 6.4.9 or above Please upgrade to FortiSASE version 23.1 or above Please upgrade to FortiManager version 7.4.3 or above Please upgrade to FortiManager version 7.2.5 or above Please upgrade to FortiManager version 7.0.12 or above Please upgrade to FortiManager version 6.4.15 or above Please upgrade to FortiManager version 6.2.14 or above Please upgrade to FortiWeb version 7.6.0 or above Please upgrade to FortiWeb version 7.4.3 or above Please upgrade to FortiAnalyzer version 7.4.3 or above Please upgrade to FortiAnalyzer version 7.2.5 or above Please upgrade to FortiAnalyzer version 7.0.12 or above Please upgrade to FortiAnalyzer version 6.4.15 or above Please upgrade to FortiAnalyzer version 6.2.14 or above Please upgrade to FortiGate Cloud version 24.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-50565 has a severity level that is typically designated as high due to its potential impact on improper communication channel restrictions.
To fix CVE-2024-50565, users should upgrade to the respective fixed versions of FortiOS, FortiProxy, and FortiManager as specified by Fortinet.
CVE-2024-50565 affects FortiOS, FortiProxy, FortiManager, and FortiAnalyzer across multiple versions.
The recommended versions to update to for CVE-2024-50565 include FortiOS 7.4.3, FortiProxy 7.4.3, and FortiManager 7.4.3.
If CVE-2024-50565 is not addressed, it could lead to unauthorized access and a compromise of the network communication channels.