Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21762: Execute unauthorized code or commands in Fortinet FortiProxy

0
Critical
VulnerabilityCVE-2024-21762cvecve-2024-21762
Published: Fri Feb 09 2024 (02/09/2024, 08:14:25 UTC)
Source: CVE
Vendor/Project: Fortinet
Product: FortiProxy

Description

A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests

AI-Powered Analysis

AILast updated: 10/21/2025, 21:08:52 UTC

Technical Analysis

CVE-2024-21762 is a critical security vulnerability identified in Fortinet FortiProxy and FortiOS products, involving an out-of-bounds write flaw that allows remote attackers to execute arbitrary code or commands. This vulnerability affects multiple versions of FortiProxy (from 1.0.0 to 7.4.2) and FortiOS (from 6.0.0 to 7.4.2), covering a broad range of deployed devices. The flaw arises due to improper bounds checking in processing specific crafted network requests, which leads to memory corruption. Exploiting this vulnerability requires no authentication or user interaction, and can be triggered remotely over the network, making it highly accessible to attackers. The CVSS v3.1 base score of 9.6 reflects the critical nature of the vulnerability, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, as successful exploitation can lead to full system compromise, data theft, or service disruption. Although no known exploits have been reported in the wild yet, the severity and ease of exploitation make it a prime target for attackers. FortiProxy is widely used in enterprise environments for web proxying, security filtering, and traffic inspection, making this vulnerability particularly dangerous. The vulnerability was reserved in early January 2024 and publicly disclosed in February 2024, with Fortinet expected to release patches. Organizations running affected versions should urgently apply updates or implement mitigations to prevent exploitation.

Potential Impact

For European organizations, the impact of CVE-2024-21762 is substantial due to the widespread use of Fortinet FortiProxy appliances in enterprise networks, government agencies, and critical infrastructure sectors. Successful exploitation can lead to unauthorized remote code execution, allowing attackers to gain full control over proxy devices that often handle sensitive traffic and enforce security policies. This can result in data breaches, interception or manipulation of network traffic, disruption of services, and potential lateral movement within networks. The compromise of FortiProxy devices could undermine perimeter defenses, exposing internal systems to further attacks. Given the criticality of these devices in securing internet access and filtering malicious content, the vulnerability poses a direct threat to confidentiality, integrity, and availability of organizational data and services. European organizations in finance, energy, telecommunications, and public administration are particularly at risk due to their reliance on Fortinet products for secure network operations. The lack of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation attempts. The absence of known exploits in the wild currently provides a narrow window for proactive defense before active exploitation emerges.

Mitigation Recommendations

To mitigate CVE-2024-21762, European organizations should immediately identify all FortiProxy and FortiOS devices running affected versions and prioritize patching as soon as Fortinet releases security updates. Until patches are applied, organizations should implement network-level mitigations such as restricting access to FortiProxy management interfaces and service ports to trusted internal networks only, using firewall rules and access control lists. Deploy network intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect and block exploitation attempts. Enable and monitor detailed logging on FortiProxy devices to identify suspicious or anomalous requests that could indicate exploitation attempts. Employ network segmentation to isolate FortiProxy devices from critical internal systems to limit potential lateral movement. Regularly review and update security policies to minimize exposure of FortiProxy services to untrusted networks. Conduct vulnerability scanning and penetration testing focused on FortiProxy appliances to verify the effectiveness of mitigations. Finally, maintain close coordination with Fortinet support and threat intelligence sources for timely updates on exploit developments and patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2024-01-02T10:15:00.527Z
Cisa Enriched
true

Threat ID: 682d983fc4522896dcbf0dc1

Added to database: 5/21/2025, 9:09:19 AM

Last enriched: 10/21/2025, 9:08:52 PM

Last updated: 12/2/2025, 7:56:02 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats