First published: Tue Jan 14 2025(Updated: )
Fortinet FortiOS and FortiProxy contain an authentication bypass vulnerability that allows a remote attacker to gain super-admin privileges via crafted CSF proxy requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.16>=7.0.0<7.0.19 | |
Fortinet FortiProxy | >=7.2.0<=7.2.12 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.16 | |
Fortinet FortiProxy | >=7.2.0<=7.2.12 | |
Fortinet FortiProxy | >=7.0.0<=7.0.19 | |
Fortinet FortiOS and FortiProxy SSL-VPN |
Please upgrade to FortiOS version 7.0.17 or above Please upgrade to FortiProxy version 7.2.13 or above Please upgrade to FortiProxy version 7.0.20 or above
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24472 is considered a critical vulnerability as it allows remote attackers to gain super-admin privileges.
To fix CVE-2025-24472, upgrade FortiOS to version 7.0.17 or later and FortiProxy to version 7.2.13 or later.
CVE-2025-24472 affects FortiOS versions 7.0.0 through 7.0.16 and 7.0.0 through 7.0.19, as well as FortiProxy versions 7.2.0 through 7.2.12.
Any organization using the affected versions of FortiOS or FortiProxy is vulnerable to CVE-2025-24472.
CVE-2025-24472 enables an authentication bypass attack through crafted CSF proxy requests.