Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-26008: Denial of service in Fortinet FortiOS

0
Medium
VulnerabilityCVE-2024-26008cvecve-2024-26008
Published: Tue Oct 14 2025 (10/14/2025, 15:23:04 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

An improper check or handling of exceptional conditions vulnerability [CWE-703] in FortiOS version 7.4.0 through 7.4.3 and before 7.2.7, FortiProxy version 7.4.0 through 7.4.3 and before 7.2.9, FortiPAM before 1.2.0 and FortiSwitchManager version 7.2.0 through 7.2.3 and version 7.0.0 through 7.0.3 fgfm daemon may allow an unauthenticated attacker to repeatedly reset the fgfm connection via crafted SSL encrypted TCP requests.

AI-Powered Analysis

AILast updated: 10/21/2025, 16:48:15 UTC

Technical Analysis

CVE-2024-26008 is a vulnerability identified in Fortinet's FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager products, specifically affecting versions 7.4.0 through 7.4.3 and earlier versions as specified. The root cause is an improper check or handling of exceptional conditions (CWE-703) within the fgfm daemon, a component responsible for managing FortiGate and FortiManager communications. An unauthenticated attacker can exploit this flaw by sending specially crafted SSL-encrypted TCP requests that cause the fgfm connection to reset repeatedly. This results in a denial of service (DoS) condition, disrupting the normal operation of the affected devices. The vulnerability does not impact confidentiality or integrity but affects availability by interrupting fgfm communications, which are critical for device management and security policy enforcement. The CVSS v3.1 base score is 5.0 (medium severity), reflecting the network attack vector, no required privileges or user interaction, and limited impact scope. No public exploits have been reported yet, but the potential for disruption exists given the unauthenticated nature of the attack vector. The vulnerability affects multiple Fortinet products widely used in enterprise and service provider environments, underscoring the importance of timely patching and monitoring.

Potential Impact

For European organizations, this vulnerability could lead to temporary denial of service conditions on critical network security infrastructure, including firewalls, proxies, and access management systems. Disruption of fgfm connections may impair centralized management and monitoring capabilities, potentially delaying incident response and security policy updates. This could increase the risk exposure window during an attack or operational incident. Organizations in sectors with stringent availability requirements, such as finance, healthcare, telecommunications, and critical infrastructure, may experience operational downtime or degraded security posture. Additionally, repeated DoS attacks could be used as a diversion tactic to mask other malicious activities. The unauthenticated nature of the exploit means attackers do not need prior access, increasing the risk from external threat actors. Although no known exploits are currently in the wild, the widespread deployment of affected Fortinet products in Europe elevates the potential impact if exploitation attempts emerge.

Mitigation Recommendations

Organizations should prioritize applying official patches from Fortinet as soon as they become available for all affected products and versions. In the interim, network administrators should implement strict ingress filtering and deep packet inspection to detect and block anomalous SSL-encrypted TCP traffic targeting the fgfm daemon ports. Deploying rate limiting on fgfm connections can reduce the risk of repeated connection resets. Monitoring network and device logs for unusual fgfm connection resets or SSL handshake failures can provide early warning signs of exploitation attempts. Segmentation of management networks and restricting access to fgfm services to trusted hosts only will minimize exposure. Regularly updating device firmware and maintaining an inventory of Fortinet product versions deployed across the organization will aid in rapid vulnerability assessment and remediation. Coordination with Fortinet support and threat intelligence sharing within industry groups can enhance situational awareness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2024-02-14T09:18:43.245Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee702b75ce224a0426b542

Added to database: 10/14/2025, 3:45:47 PM

Last enriched: 10/21/2025, 4:48:15 PM

Last updated: 12/2/2025, 11:23:39 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats