Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-26008: Denial of service in Fortinet FortiOS

0
Medium
VulnerabilityCVE-2024-26008cvecve-2024-26008
Published: Tue Oct 14 2025 (10/14/2025, 15:23:04 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

An improper check or handling of exceptional conditions vulnerability [CWE-703] in FortiOS version 7.4.0 through 7.4.3 and before 7.2.7, FortiProxy version 7.4.0 through 7.4.3 and before 7.2.9, FortiPAM before 1.2.0 and FortiSwitchManager version 7.2.0 through 7.2.3 and version 7.0.0 through 7.0.3 fgfm daemon may allow an unauthenticated attacker to repeatedly reset the fgfm connection via crafted SSL encrypted TCP requests.

AI-Powered Analysis

AILast updated: 10/14/2025, 15:52:27 UTC

Technical Analysis

CVE-2024-26008 is a denial of service (DoS) vulnerability identified in Fortinet's FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager products. The root cause is an improper check or handling of exceptional conditions (CWE-703) within the fgfm daemon, which manages communication between Fortinet devices and FortiManager. Specifically, crafted SSL-encrypted TCP requests can cause the fgfm connection to reset repeatedly. This vulnerability affects FortiOS versions 7.4.0 through 7.4.3 and versions prior to 7.2.7, FortiProxy 7.4.0 through 7.4.3 and before 7.2.9, FortiPAM before 1.2.0, and FortiSwitchManager versions 7.2.0 through 7.2.3 and 7.0.0 through 7.0.3. The attack vector is network-based, requiring no authentication or user interaction, which increases the risk of exploitation. The CVSS v3.1 base score is 5.0 (medium), reflecting the impact on availability only, with no confidentiality or integrity loss. The vulnerability can cause service disruption by destabilizing the fgfm connection, potentially impacting device management and network security operations. No public exploits or active exploitation have been reported to date. Fortinet has not yet provided patch links in the provided data, but affected organizations should monitor for official updates and advisories. The vulnerability's exploitation could disrupt security monitoring and management functions, leading to potential operational downtime and increased risk exposure if devices become unmanageable during attack periods.

Potential Impact

For European organizations, the primary impact of CVE-2024-26008 is the potential denial of service on Fortinet security infrastructure, which could disrupt network security management and monitoring capabilities. This may lead to temporary loss of visibility and control over network traffic, increasing the risk of undetected malicious activity during the downtime. Critical sectors such as finance, healthcare, energy, and government could face operational interruptions, regulatory compliance challenges, and reputational damage if security devices become unavailable. The lack of confidentiality or integrity impact limits direct data breach risks, but availability loss in security appliances can indirectly facilitate further attacks. Organizations relying heavily on Fortinet products for perimeter defense and internal segmentation are particularly vulnerable to operational disruptions. The unauthenticated and remote nature of the exploit increases the threat surface, especially for internet-facing Fortinet devices. However, the medium severity and absence of known exploits reduce immediate urgency but still warrant proactive mitigation to maintain continuous security operations.

Mitigation Recommendations

European organizations should implement the following specific mitigation steps: 1) Immediately inventory all Fortinet devices to identify affected versions of FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager. 2) Monitor Fortinet's official security advisories and apply vendor-provided patches or updates as soon as they become available, prioritizing devices exposed to untrusted networks. 3) If patches are not yet available, consider temporary network-level mitigations such as filtering or rate-limiting SSL-encrypted TCP traffic targeting the fgfm daemon ports to reduce attack surface. 4) Enhance monitoring for unusual fgfm connection resets or network anomalies indicative of attempted exploitation. 5) Segment management networks to restrict access to Fortinet management interfaces, limiting exposure to potential attackers. 6) Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect crafted packets targeting this vulnerability. 7) Conduct regular backups of device configurations to enable rapid recovery if devices become unresponsive. 8) Train security operations teams to recognize symptoms of fgfm connection disruptions and respond promptly. 9) Review and update incident response plans to include scenarios involving denial of service on critical security infrastructure. These targeted actions go beyond generic advice by focusing on the specific fgfm daemon and Fortinet product ecosystem.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2024-02-14T09:18:43.245Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee702b75ce224a0426b542

Added to database: 10/14/2025, 3:45:47 PM

Last enriched: 10/14/2025, 3:52:27 PM

Last updated: 10/16/2025, 11:58:02 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats