Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-32122: Information disclosure in Fortinet FortiOS

0
Low
VulnerabilityCVE-2024-32122cvecve-2024-32122
Published: Tue Apr 08 2025 (04/08/2025, 14:02:57 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

A storing passwords in a recoverable format in Fortinet FortiOS 7.4.0 through 7.4.8, FortiOS 7.2 all versions, FortiOS 7.0 all versions, FortiOS 6.4 all versions allows attacker to information disclosure via modification of LDAP server IP to point to a malicious server.

AI-Powered Analysis

AILast updated: 01/14/2026, 14:51:35 UTC

Technical Analysis

CVE-2024-32122 is an information disclosure vulnerability affecting multiple versions of Fortinet FortiOS, specifically 6.4.x, 7.0.x, 7.2.x, and 7.4.0 through 7.4.8. The root cause is that FortiOS stores passwords in a recoverable format, which is a security weakness. An attacker with high-level privileges on the device can exploit this by modifying the LDAP server IP address configuration to point to a malicious LDAP server under their control. This redirection can cause the device to send sensitive authentication data, including passwords, to the attacker’s server, leading to information disclosure. The vulnerability does not require user interaction but does require the attacker to have authenticated administrative access to the FortiOS device. The CVSS v3.1 score is 2.1, reflecting a low severity primarily due to the requirement for high privileges and limited scope of impact. No known exploits have been reported in the wild, and no patches or mitigations have been explicitly linked in the provided data. The vulnerability primarily affects confidentiality, with no direct impact on integrity or availability. This issue highlights the risks of improper password storage and the importance of securing administrative interfaces and configurations on network security devices.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive password information if an attacker gains administrative access to FortiOS devices and manipulates LDAP configurations. This could facilitate further lateral movement or privilege escalation within the network. While the direct impact is limited due to the high privilege requirement, organizations with Fortinet FortiOS devices in critical network infrastructure—such as government, finance, telecommunications, and large enterprises—may face increased risk if internal access controls are weak. The exposure of credentials could undermine trust in authentication mechanisms and potentially lead to broader compromise if attackers leverage disclosed passwords elsewhere. However, the low CVSS score and lack of known exploits suggest the immediate risk is limited. Still, the vulnerability underscores the need for strict administrative access controls and monitoring of configuration changes in FortiOS devices.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict administrative access to FortiOS devices using strong authentication methods such as multi-factor authentication (MFA) and IP whitelisting to prevent unauthorized configuration changes. 2) Monitor and audit LDAP server IP configuration changes on FortiOS devices to detect unauthorized modifications promptly. 3) Regularly review and update FortiOS devices to the latest versions once Fortinet releases patches addressing this vulnerability. 4) Employ network segmentation to limit access to FortiOS management interfaces only to trusted administrators. 5) Use encrypted and secure channels for LDAP communication to reduce the risk of interception or redirection. 6) Conduct internal security assessments to verify that password storage and handling practices comply with best security standards. 7) Educate network administrators about the risks of configuration changes and enforce change management policies. These targeted actions go beyond generic advice by focusing on configuration integrity monitoring and access control hardening specific to FortiOS LDAP settings.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2024-04-11T12:09:46.571Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ca899209f2030fa01698b

Added to database: 11/18/2025, 5:10:49 PM

Last enriched: 1/14/2026, 2:51:35 PM

Last updated: 2/7/2026, 3:36:02 PM

Views: 147

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats