Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-26006: Execute unauthorized code or commands in Fortinet FortiProxy

0
Medium
VulnerabilityCVE-2024-26006cvecve-2024-26006
Published: Fri Mar 14 2025 (03/14/2025, 09:24:56 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiProxy

Description

An improper neutralization of input during web page Generation vulnerability [CWE-79] in FortiOS version 7.4.3 and below, version 7.2.7 and below, version 7.0.13 and below and FortiProxy version 7.4.3 and below, version 7.2.9 and below, version 7.0.16 and below web SSL VPN UI may allow a remote unauthenticated attacker to perform a Cross-Site Scripting attack via a malicious samba server.

AI-Powered Analysis

AILast updated: 02/26/2026, 21:33:18 UTC

Technical Analysis

CVE-2024-26006 is a vulnerability classified as improper neutralization of input during web page generation (CWE-79), commonly known as Cross-Site Scripting (XSS), affecting Fortinet FortiProxy and FortiOS SSL VPN web UI components. The flaw exists in versions 7.4.3 and below, 7.2.7 and below, and 7.0.13 and below for FortiOS, and similarly in FortiProxy versions 7.4.3 and below, 7.2.9 and below, and 7.0.16 and below. The vulnerability allows a remote attacker without authentication to inject malicious scripts via a crafted Samba server, which the SSL VPN web UI improperly sanitizes during page generation. When a user interacts with the malicious content, the injected script executes in their browser context, potentially enabling unauthorized command execution or code execution within the user's session. The CVSS 3.1 base score of 6.9 reflects a medium severity, with attack vector network-based, high attack complexity, no privileges required, but user interaction necessary. The vulnerability impacts confidentiality, integrity, and availability by allowing attackers to hijack sessions, steal sensitive data, or manipulate VPN functionality. No public exploits have been reported yet, but the presence of this vulnerability in widely deployed Fortinet products used for secure remote access makes it a significant concern. Fortinet has not yet published patches or mitigation details, increasing the urgency for organizations to monitor updates and apply fixes promptly once available.

Potential Impact

The vulnerability poses a risk to organizations relying on Fortinet FortiProxy and FortiOS SSL VPN web UI for secure remote access. Successful exploitation can lead to unauthorized code execution in the context of the victim's browser session, potentially resulting in session hijacking, theft of credentials, or execution of malicious commands on the VPN interface. This compromises confidentiality by exposing sensitive user and network data, integrity by allowing unauthorized changes, and availability if attackers disrupt VPN services. Given the widespread use of Fortinet products in enterprises, government agencies, and critical infrastructure, the impact could be significant, especially in environments where VPN access is a critical security boundary. The requirement for user interaction limits mass exploitation but does not eliminate targeted attacks against high-value users. The medium CVSS score reflects this balance of risk. Organizations without timely patching or mitigations may face increased exposure to phishing campaigns or supply chain attacks leveraging this vulnerability.

Mitigation Recommendations

Organizations should immediately inventory their Fortinet FortiProxy and FortiOS SSL VPN deployments to identify affected versions. Until patches are released, apply the following mitigations: 1) Restrict access to the SSL VPN web UI to trusted networks and users only, reducing exposure to untrusted Samba servers or malicious hosts. 2) Implement strict network segmentation and firewall rules to limit SMB/Samba traffic from untrusted sources to VPN infrastructure. 3) Educate users about the risks of interacting with suspicious links or network shares that could trigger the XSS attack. 4) Monitor VPN logs and network traffic for unusual activity indicative of exploitation attempts. 5) Deploy web application firewalls (WAFs) with custom rules to detect and block malicious input patterns targeting the SSL VPN UI. 6) Once Fortinet releases patches, prioritize immediate testing and deployment to fully remediate the vulnerability. 7) Consider multi-factor authentication (MFA) enforcement to reduce impact if credentials are compromised. These targeted actions go beyond generic advice by focusing on network-level controls and user awareness specific to this vulnerability's attack vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2024-02-14T09:18:43.245Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a43c85912abc71d620db

Added to database: 2/26/2026, 7:51:24 PM

Last enriched: 2/26/2026, 9:33:18 PM

Last updated: 2/26/2026, 11:12:29 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses