First published: Tue Aug 13 2024(Updated: )
An improper access control vulnerability [CWE-284] in FortiOS may allow an attacker who has already successfully obtained write access to the underlying system (via another hypothetical exploit) to bypass the file integrity checking system.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | >=7.4.0<=7.4.3 | |
Fortinet FortiOS | >=7.2.5<=7.2.7 | |
Fortinet FortiOS | >=7.0.12<=7.0.14 | |
Fortinet FortiOS | >=6.4.13<=6.4.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-24-012 vulnerability is classified as a critical severity issue due to improper access control that could be exploited after gaining write access.
To mitigate FG-IR-24-012, update FortiOS to version 7.4.4 or later, 7.2.8 or later, or 7.0.15 or later.
FG-IR-24-012 affects FortiOS versions 7.4.0 to 7.4.3, 7.2.5 to 7.2.7, and 7.0.12 to 7.0.14, as well as specific 6.4.x versions.
FG-IR-24-012 is an improper access control vulnerability, which falls under CWE-284.
No, the FG-IR-24-012 vulnerability requires prior write access to the underlying system to be exploited.