First published: Tue Apr 08 2025(Updated: )
An Improper Output Neutralization for Logs vulnerability [CWE-117] in FortiManager and FortiAnalyzer may allow an unauthenticated remote attacker to pollute the logs via crafted login requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | >=7.6.0<=7.6.1 | |
Fortinet FortiAnalyzer | >=7.4.0<=7.4.5 | |
Fortinet FortiAnalyzer | >=7.2.0<=7.2.8 | |
Fortinet FortiAnalyzer | >=7.0.0<=7.0.13 | |
Fortinet FortiManager | >=7.6.0<=7.6.1 | |
Fortinet FortiManager | >=7.4.0<=7.4.5 | |
Fortinet FortiManager | >=7.2.0<=7.2.8 | |
Fortinet FortiManager | >=7.0.0<=7.0.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-24-453 vulnerability is classified as critical due to its potential for log pollution by unauthenticated remote attackers.
To mitigate FG-IR-24-453, update FortiManager and FortiAnalyzer to the versions specified in the advisory.
FG-IR-24-453 affects multiple versions of FortiManager and FortiAnalyzer within specific version ranges.
Yes, FG-IR-24-453 can be exploited by an unauthenticated remote attacker.
The exploitation of FG-IR-24-453 can lead to log manipulation, potentially impacting security visibility and incident response.