CVE Vulnerabilities

CVE-2024-48886

Weak Authentication

Published: Jan 14, 2025 | Modified: Feb 03, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A weak authentication in Fortinet FortiOS versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, FortiProxy versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3 allows attacker to execute unauthorized code or commands via a brute-force attack.

Weakness

The product uses an authentication mechanism to restrict access to specific users or identities, but the mechanism does not sufficiently prove that the claimed identity is correct.

Affected Software

Name Vendor Start Version End Version
Fortianalyzer Fortinet 7.4.1 (including) 7.4.4 (excluding)
Fortianalyzer Fortinet 7.6.0 (including) 7.6.2 (excluding)
Fortianalyzer_cloud Fortinet 7.4.1 (including) 7.4.4 (excluding)
Fortimanager Fortinet 7.4.1 (including) 7.4.4 (excluding)
Fortimanager Fortinet 7.6.0 (including) 7.6.2 (excluding)
Fortimanager_cloud Fortinet 7.4.1 (including) 7.4.4 (excluding)
Fortiproxy Fortinet 2.0.0 (including) 2.0.15 (excluding)
Fortiproxy Fortinet 7.0.0 (including) 7.0.18 (excluding)
Fortiproxy Fortinet 7.2.0 (including) 7.2.11 (excluding)
Fortiproxy Fortinet 7.4.0 (including) 7.4.5 (excluding)
Fortios Fortinet 6.4.0 (including) 7.0.16 (excluding)
Fortios Fortinet 7.2.0 (including) 7.2.9 (excluding)
Fortios Fortinet 7.4.0 (including) 7.4.5 (excluding)

Extended Description

Attackers may be able to bypass weak authentication faster and/or with less effort than expected.

References