Home

Description

An authentication bypass using an alternate path or channel [CWE-288] vulnerability in Fortinet FortiOS version 6.4.0 through 6.4.15 and before 6.2.16, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8 and before 7.0.15 & FortiPAM before version 1.2.0 allows an unauthenticated attacker to seize control of a managed device via crafted FGFM requests, if the device is managed by a FortiManager, and if the attacker knows that FortiManager's serial number.

PUBLISHED Reserved 2024-02-14 | Published 2025-08-12 | Updated 2025-08-13 | Assigner fortinet




HIGH: 7.9CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C

Problem types

Execute unauthorized code or commands

Product status

Default status
unaffected

1.2.0
affected

1.1.0
affected

1.0.0
affected

Default status
unaffected

7.2.0
affected

7.0.0
affected

Default status
unaffected

7.4.0
affected

7.2.0
affected

7.0.0
affected

Default status
unaffected

6.4.0
affected

6.2.0
affected

6.0.0
affected

References

fortiguard.fortinet.com/psirt/FG-IR-24-042

cve.org (CVE-2024-26009)

nvd.nist.gov (CVE-2024-26009)

Download JSON