Rewterz
MassLogger Malware – Active IOCs
January 15, 2025
Rewterz
Multiple SAP Products Vulnerabilities
January 15, 2025

Multiple Fortinet Products Vulnerabilities

Severity

High

Analysis Summary

CVE-2024-46668 CVSS:7.1

An allocation of resources without limits or throttling vulnerability [CWE-770] in FortiOS versions 7.4.0 through 7.4.4, versions 7.2.0 through 7.2.8, versions 7.0.0 through 7.0.15, and versions 6.4.0 through 6.4.15 may allow an unauthenticated remote user to consume all system memory via multiple large file uploads.

CVE-2024-35273 CVSS:7

A out-of-bounds write in Fortinet FortiManager version 7.4.0 through 7.4.2, FortiAnalyzer version 7.4.0 through 7.4.2 allows attacker to escalation of privilege via specially crafted http requests.

CVE-2024-48884 CVSS:7.1

A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiOS versions 7.6.0, 7.4.0 through 7.4.4, 7.2.5 through 7.2.9, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, FortiProxy 7.4.0 through 7.4.5, 7.2.0 through 7.2.11, 7.0.0 through 7.0.18, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiManager Cloud versions 7.4.1 through 7.4.3, FortiRecorder versions.

CVE-2023-37936 CVSS:9.6

A use of hard-coded cryptographic key in Fortinet FortiSwitch version 7.4.0 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.7 and 6.4.0 through 6.4.13 and 6.2.0 through 6.2.7 and 6.0.0 through 6.0.7 allows attacker to execute unauthorized code or commands via crafted requests.

CVE-2024-48886 CVSS:8

A weak authentication in Fortinet FortiOS versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.15, 6.4.0 through 6.4.15, FortiProxy versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3 allows attacker to execute unauthorized code or commands via a brute-force attack.

CVE-2024-27778 CVSS:8.3

An improper neutralization of special elements used in an OS Command vulnerability [CWE-78] in Fortinet FortiSandbox version 4.4.0 through 4.4.4, 4.2.0 through 4.2.6 and below 4.0.4 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests.

CVE-2024-35277 CVSS:8.4

A missing authentication for critical function in Fortinet FortiPortal version 6.0.0 through 6.0.15, FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14 allows attacker to access to the configuration of the managed devices by sending specifically crafted packets.

Impact

  • Privilege Escalation
  • Gain Access

Indicators of Compromise

CVE

  • CVE-2024-46668

  • CVE-2024-35273

  • CVE-2024-48884

  • CVE-2023-37936

  • CVE-2024-48886

  • CVE-2024-27778

  • CVE-2024-35277

Affected Vendors

Fortinet

Affected Products

  • Fortinet FortiAnalyzer - 7.4.0
  • Fortinet FortiManager - 7.4.0
  • Fortinet FortiOS - 7.4.0 - 7.2.0 - 7.0.0 - 6.4.0
  • Fortinet FortiManager - 7.6.0 - 7.4.1
  • Fortinet FortiOS - 7.6.0 - 7.4.0 - 7.2.0 - 7.0.0 - 6.4.0
  • Fortinet FortiProxy - 7.4.0 - 7.2.0 - 7.0.0 - 2.0.0 - 1.2.0 - 1.1.0 - 1.0.0
  • Fortinet FortiSwitch - 7.4.0 - 7.2.0 - 7.0.0 - 6.4.0 - 6.2.0 - 6.0.0
  • Fortinet FortiSandbox - 4.4.0 - 4.2.0 - 4.0.0 - 3.2.0 - 3.1.0 - 3.0.5
  • Fortinet FortiManager - 7.4.0 - 7.2.0 - 7.0.0 - 6.4.0

Remediation

Refer to Fortinet Security Advisory for patch, upgrade, or suggested workaround information.

CVE-2024-46668

CVE-2024-35273

CVE-2024-48884

CVE-2023-37936

CVE-2024-48886

CVE-2024-27778

CVE-2024-35277