Rewterz
Multiple Microsoft Products Vulnerabilities
February 3, 2025
Rewterz
Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware – Active IOCs
February 3, 2025

Multiple Fortinet Products Vulnerabilities

Severity

Medium

Analysis Summary

CVE-2024-33502 CVSS:6.4

An improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiManager, FortiAnalyzer versions 7.4.0 through 7.4.2 and 7.2.0 through 7.2.5 and 7.0.0 through 7.0.12 and 6.4.0 through 6.4.14 and 6.2.0 through 6.2.12 and 6.0.0 through 6.0.12 allows attacker to execute unauthorized code or commands via crafted HTTP or HTTPs requests.

CVE-2024-54021 CVSS:6.4

An improper neutralization of crlf sequences in http headers ('http response splitting') in Fortinet FortiOS 7.2.0 through 7.6.0, FortiProxy 7.2.0 through 7.4.5 allows attacker to execute unauthorized code or commands via crafted HTTP header.

CVE-2024-35278 CVSS:4.1

A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiPortal versions 7.2.4 through 7.2.0 and 7.0.0 through 7.2.8 may allow an authenticated attacker to view the SQL query being run server-side when submitting an HTTP request, via including special elements in said request.

CVE-2024-40587 CVSS:6.3

An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiVoice version 7.0.0 through 7.0.4 and before 6.4.9 allows an authenticated privileged attacker to execute unauthorized code or commands via crafted CLI requests.

CVE-2024-46664 CVSS:5.2

A relative path traversal in Fortinet FortiRecorder [CWE-23] version 7.2.0 through 7.2.1 and before 7.0.4 allows a privileged attacker to read files from the underlying filesystem via crafted HTTP or HTTPs requests.

CVE-2024-47566 CVSS:4.8

A improper limitation of a pathname to a restricted directory ('path traversal') [CWE-23] in Fortinet FortiRecorder version 7.2.0 through 7.2.1 and before 7.0.4 allows a privileged attacker to delete files from the underlying filesystem via crafted CLI requests.

Impact

  • Gain Access

Indicators of Compromise

CVE

  • CVE-2024-33502

  • CVE-2024-54021

  • CVE-2024-35278

  • CVE-2024-40587

  • CVE-2024-46664

  • CVE-2024-47566

Affected Vendors

Fortinet

Affected Products

  • Fortinet FortiManager - 7.4.0 - 7.2.0 - 7.0.0 - 6.4.0 - 6.2.0 - 6.0.0
  • Fortinet FortiAnalyzer - 7.4.0 - 7.2.0 - 7.0.0 - 6.4.0 - 6.2.0 - 6.0.0
  • Fortinet FortiOS - 7.6.0 - 7.4.0 - 7.2.0
  • Fortinet FortiProxy - 7.4.0 - 7.2.0
  • Fortinet FortiPortal - 7.2.0 - 7.0.0
  • Fortinet FortiVoice - 7.0.0 - 6.4.0 - 6.0.0
  • Fortinet FortiRecorder - 7.2.0 - 7.0.0 - 6.4.0

Remediation

Refer to Fortinet Security Advisory for patch, upgrade, or suggested workaround information.

CVE-2024-33502

CVE-2024-54021

CVE-2024-35278

CVE-2024-40587

CVE-2024-46664

CVE-2024-47566