First published: Tue Feb 11 2025(Updated: )
An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-22] in FortiManager and FortiAnalyzer CLI may allow any authenticated admin user with diagnose privileges to delete any file on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.4.0<=7.4.2 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.5 | |
Fortinet FortiAnalyzer | >=7.0 | |
Fortinet FortiAnalyzer | >=6.4 | |
Fortinet FortiManager | >=7.4.0<=7.4.2 | |
Fortinet FortiManager | >=7.2.0<=7.2.5 | |
Fortinet FortiManager | >=7.0 | |
Fortinet FortiManager | >=6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-24-147 is categorized as critical due to its potential for file deletion by authenticated admin users.
To fix FG-IR-24-147, upgrade FortiManager and FortiAnalyzer to version 7.4.3 or 7.2.6 or later.
FG-IR-24-147 affects FortiManager and FortiAnalyzer versions 7.4.0 to 7.4.2 and 7.2.0 to 7.2.5.
FG-IR-24-147 is a path traversal vulnerability that can lead to unauthorized file deletion.
If you cannot update, it's crucial to restrict admin access and monitor file changes to mitigate the risk associated with FG-IR-24-147.