First published: Tue Jan 14 2025(Updated: )
A missing authentication for critical function vulnerability [CWE-306] in FortiManager and FortiPortal may allow a remote unauthenticated attacker to extract the configuration of all managed devices
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiManager Cloud | >=7.4.1<=7.4.2 | |
Fortinet FortiManager Cloud | >=7.2.1<=7.2.5 | |
Fortinet FortiManager Cloud | >=7.0.1<=7.0.12 | |
Fortinet FortiManager | >=7.4.0<=7.4.2 | |
Fortinet FortiManager | >=7.2.0<=7.2.5 | |
Fortinet FortiManager | >=7.0.0<=7.0.12 | |
Fortinet FortiManager | >=6.4.0<=6.4.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-24-135 vulnerability is classified as critical due to the potential for remote unauthenticated access to sensitive configuration data.
To remediate FG-IR-24-135, update FortiManager or FortiPortal to the recommended versions specified in the advisories.
FortiManager versions 7.4.0 to 7.4.2, 7.2.0 to 7.2.5, and 7.0.0 to 7.0.12 are impacted by FG-IR-24-135.
Yes, FG-IR-24-135 can be exploited remotely by an unauthenticated attacker to extract configurations.
FG-IR-24-135 poses a significant security risk as it allows unauthorized access to configuration details of managed devices.