Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23113: Execute unauthorized code or commands in Fortinet FortiSwitchManager

0
Critical
VulnerabilityCVE-2024-23113cvecve-2024-23113
Published: Thu Feb 15 2024 (02/15/2024, 13:59:25 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiSwitchManager

Description

A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.

AI-Powered Analysis

AILast updated: 10/21/2025, 19:47:38 UTC

Technical Analysis

CVE-2024-23113 is a critical security vulnerability identified in Fortinet's FortiSwitchManager and several other Fortinet products including FortiOS, FortiProxy, and FortiPAM. The root cause is an externally-controlled format string vulnerability, which allows attackers to craft malicious packets that can trigger unauthorized code or command execution on affected devices. This flaw exists in FortiSwitchManager versions 7.2.0 through 7.2.3 and 7.0.0 through 7.0.3, as well as in multiple versions of FortiOS, FortiProxy, and FortiPAM. The vulnerability does not require any authentication or user interaction, making it exploitable remotely over the network with low complexity. The CVSS v3.1 base score of 9.8 reflects the critical impact on confidentiality, integrity, and availability, with an attack vector of network and no privileges required. Exploitation could allow attackers to take full control of the affected device, potentially leading to network disruption, data theft, or further lateral movement within an organization’s infrastructure. Although no known exploits have been reported in the wild as of the publication date, the severity and ease of exploitation make this a high-priority vulnerability for organizations using Fortinet products. The vulnerability affects devices that are often deployed in enterprise and service provider environments for network management and security, increasing the risk profile. Fortinet has not yet published patches at the time of this report, so organizations must monitor vendor advisories closely and apply updates promptly once available. Additionally, network traffic monitoring for anomalous packets targeting FortiSwitchManager and related services is recommended to detect potential exploitation attempts.

Potential Impact

The impact of CVE-2024-23113 on European organizations can be significant due to the widespread use of Fortinet products in enterprise networks, government agencies, and critical infrastructure sectors. Successful exploitation allows attackers to execute arbitrary code remotely, leading to complete compromise of affected devices. This can result in unauthorized access to sensitive data, disruption of network operations, and potential pivoting to other internal systems. Given FortiSwitchManager’s role in managing network switches, attackers could manipulate network traffic, disable security controls, or create persistent backdoors. For European organizations, this poses risks to data privacy compliance (e.g., GDPR), operational continuity, and national security, especially in sectors like finance, telecommunications, energy, and public administration. The vulnerability’s network-based attack vector and lack of authentication requirements increase the likelihood of exploitation by cybercriminals or state-sponsored actors. The absence of known exploits in the wild currently provides a limited window for proactive defense, but the critical severity demands immediate attention to prevent potential large-scale attacks targeting European networks.

Mitigation Recommendations

1. Monitor Fortinet’s official security advisories for patches addressing CVE-2024-23113 and apply them immediately upon release. 2. Until patches are available, implement network segmentation to isolate FortiSwitchManager and related Fortinet devices from untrusted networks. 3. Deploy intrusion detection and prevention systems (IDS/IPS) with updated signatures to detect anomalous packets or exploitation attempts targeting the format string vulnerability. 4. Conduct thorough vulnerability scanning and asset inventory to identify all affected Fortinet devices within the network. 5. Restrict network access to management interfaces of FortiSwitchManager and related products using firewall rules and access control lists (ACLs). 6. Enable and review detailed logging on Fortinet devices to detect suspicious activity indicative of exploitation attempts. 7. Educate network and security teams about the vulnerability’s characteristics and ensure incident response plans include procedures for Fortinet device compromise. 8. Consider deploying network behavior anomaly detection tools to identify unusual traffic patterns that could signal exploitation. 9. Engage with Fortinet support for guidance and potential workarounds if patches are delayed. 10. Regularly back up device configurations and critical data to enable rapid recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2024-01-11T16:29:07.980Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b2247d717aace26992

Added to database: 10/21/2025, 7:06:26 PM

Last enriched: 10/21/2025, 7:47:38 PM

Last updated: 10/30/2025, 1:57:04 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats