First published: Tue Jan 14 2025(Updated: )
An allocation of resources without limits or throttling [CWE-770] vulnerability in FortiOS may allow a remote unauthenticated attacker to prevent access to the GUI via specially crafted requests directed at specific endpoints.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | =. | |
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.4 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.8 | |
Fortinet FortiOS IPS Engine | >=7.0 | |
Fortinet FortiOS IPS Engine | >=6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-24-250 vulnerability is considered a critical issue due to its potential to allow remote unauthenticated attacks.
To remediate FG-IR-24-250, update FortiOS to version 7.6.1 or later, or apply the appropriate patches for earlier affected versions.
An attacker exploiting FG-IR-24-250 can prevent access to the FortiOS GUI by sending specially crafted requests.
FG-IR-24-250 affects various versions of FortiOS, specifically those prior to the fixed versions mentioned in the advisory.
Yes, FG-IR-24-250 can be exploited remotely by an unauthenticated attacker, highlighting its critical nature.