First published: Tue Jan 14 2025(Updated: )
An improper limitation of a pathname to a restricted directory vulnerability ('path traversal') [CWE-22] in FortiManager, FortiOS, FortiProxy, FortiRecorder, FortiVoice and FortiWeb may allow a remote authenticated attacker with access to the security fabric interface and port to write arbitrary files and a remote unauthenticated attacker with the same network access to delete an arbitrary folder.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiManager | >=7.6.0<=7.6.1 | |
Fortinet FortiManager | >=7.4.1<=7.4.3 | |
Fortinet FortiManager Cloud | >=7.4.1<=7.4.3 | |
Fortinet FortiOS IPS Engine | =. | |
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.4 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.9 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.15 | |
Fortinet FortiOS IPS Engine | >=6.4 | |
Fortinet FortiProxy | >=7.4.0<=7.4.5 | |
Fortinet FortiProxy | >=7.2.0<=7.2.11 | |
Fortinet FortiProxy | >=7.0.0<=7.0.18 | |
Fortinet FortiProxy | >=2.0 | |
Fortinet FortiProxy | >=1.2 | |
Fortinet FortiProxy | >=1.1 | |
Fortinet FortiProxy | >=1.0 | |
Fortinet FortiRecorder 400D | >=7.2.0<=7.2.1 | |
Fortinet FortiRecorder 400D | >=7.0.0<=7.0.4 | |
Fortinet FortiVoice Enterprise | >=7.0.0<=7.0.4 | |
Fortinet FortiVoice Enterprise | >=6.4.0<=6.4.9 | |
Fortinet FortiVoice Enterprise | >=6.0 | |
Fortinet FortiWeb | =. | |
Fortinet FortiWeb | >=7.4.0<=7.4.4 | |
Fortinet FortiWeb | >=7.2 | |
Fortinet FortiWeb | >=7.0 | |
Fortinet FortiWeb | >=6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-24-259 is considered high as it involves path traversal vulnerabilities that can allow remote attackers to access restricted directories.
To fix FG-IR-24-259, update affected Fortinet products to the recommended versions listed in the advisory.
Versions of FortiManager, FortiOS, FortiProxy, FortiRecorder, FortiVoice, and FortiWeb prior to the mentioned remediation versions are affected by FG-IR-24-259.
Yes, FG-IR-24-259 can be exploited by remote authenticated attackers with access to the security fabric interface.
Yes, the exploit for FG-IR-24-259 requires the attacker to be authenticated.