8.1
CVE-2024-26009
- EPSS 0.13%
- Veröffentlicht 12.08.2025 18:59:47
- Zuletzt bearbeitet 14.08.2025 01:13:14
- Quelle psirt@fortinet.com
- Teams Watchlist Login
- Unerledigt Login
An authentication bypass using an alternate path or channel [CWE-288] vulnerability in Fortinet FortiOS version 6.4.0 through 6.4.15 and before 6.2.16, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8 and before 7.0.15 & FortiPAM before version 1.2.0 allows an unauthenticated attacker to seize control of a managed device via crafted FGFM requests, if the device is managed by a FortiManager, and if the attacker knows that FortiManager's serial number.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Fortinet ≫ Fortiswitchmanager Version >= 7.0.0 < 7.0.4
Fortinet ≫ Fortiswitchmanager Version >= 7.2.0 < 7.2.4
Fortinet ≫ Fortiproxy Version >= 7.0.0 < 7.0.16
Fortinet ≫ Fortiproxy Version >= 7.2.0 < 7.2.9
Fortinet ≫ Fortiproxy Version >= 7.4.0 < 7.4.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.13% | 0.337 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.1 | 2.2 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
psirt@fortinet.com | 8.1 | 2.2 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-288 Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication.