First published: Thu Oct 17 2024(Updated: )
A missing authentication for critical function vulnerability [CWE-306] in FortiManager fgfmd daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands via specially crafted requests. Reports have shown this vulnerability to be exploited in the wild.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiManager | =. | |
Fortinet FortiManager | >=7.4.0<=7.4.4 | |
Fortinet FortiManager | >=7.2.0<=7.2.7 | |
Fortinet FortiManager | >=7.0.0<=7.0.12 | |
Fortinet FortiManager | >=6.4.0<=6.4.14 | |
Fortinet FortiManager | >=6.2.0<=6.2.12 | |
Fortinet FortiManager Cloud | >=7.4.1<=7.4.4 | |
Fortinet FortiManager Cloud | >=7.2.1<=7.2.7 | |
Fortinet FortiManager Cloud | >=7.0.1<=7.0.12 | |
Fortinet FortiManager Cloud | >=6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-24-423 is considered critical due to the potential for remote unauthenticated attackers to execute arbitrary code.
To fix FG-IR-24-423, upgrade your FortiManager or FortiManager Cloud product to the latest patched version as specified by Fortinet.
FG-IR-24-423 affects multiple versions of FortiManager, including 6.2.0 to 6.2.12, 6.4.0 to 6.4.14, 7.0.0 to 7.0.12, 7.2.0 to 7.2.7, and 7.4.1 to 7.4.4.
If exploited, FG-IR-24-423 can allow remote unauthenticated attackers to execute arbitrary code or commands on the affected systems.
Yes, reports have indicated that FG-IR-24-423 is being exploited in the wild.