First published: Tue Apr 08 2025(Updated: )
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in FortiIsolator may allow a privileged attacker with super-admin profile and CLI access to execute unauthorized code via specifically crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiIsolator | <2.4.6 | |
Fortinet FortiIsolator | >=2.4.3<=2.4.6 |
Please upgrade to FortiIsolator version 2.4.7 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-54024 has been classified with a high severity rating due to the potential for OS command injection conducted by privileged attackers.
To mitigate CVE-2024-54024, upgrade Fortinet FortiIsolator to version 2.4.6 or later.
CVE-2024-54024 specifically affects Fortinet FortiIsolator versions prior to 2.4.6.
Exploitation of CVE-2024-54024 requires a privileged attacker with super-admin profile and CLI access.
Exploiting CVE-2024-54024 allows an attacker to execute unauthorized code on the affected system.