First published: Tue May 13 2025(Updated: )
A missing authentication for critical function vulnerability [CWE-306] in FortiOS, FortiProxy, and FortiSwitchManager TACACS+ configured to use a remote TACACS+ server for authentication, that has itself been configured to use ASCII authentication may allow an attacker with knowledge of an existing admin account to access the device as a valid admin via an authentication bypass.
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | =. | |
FortiOS | >=7.4.4<=7.4.6 | |
Fortinet FortiProxy SSL VPN webmode | >=7.6.0<=7.6.1 | |
Fortinet FortiSwitchManager | =. |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-24-472 is considered critical due to the potential for unauthenticated access to critical functions.
To fix FG-IR-24-472, upgrade FortiOS to version 7.6.1 or later, FortiProxy to version 7.6.2 or later, or FortiSwitchManager to version 7.2.6.
FG-IR-24-472 affects FortiOS, FortiProxy, and FortiSwitchManager based on their configured versions.
The impact of FG-IR-24-472 allows attackers to exploit missing authentication, potentially compromising critical system functions.
Yes, FG-IR-24-472 is a recognized vulnerability that has been disclosed and documented by Fortinet.