Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-35280: Execute unauthorized code or commands in Fortinet FortiDeceptor

0
Medium
VulnerabilityCVE-2024-35280cvecve-2024-35280
Published: Wed Jan 15 2025 (01/15/2025, 10:07:14 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiDeceptor

Description

A improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Fortinet FortiDeceptor 5.3.0, FortiDeceptor 5.2.0, FortiDeceptor 5.1 all versions, FortiDeceptor 5.0 all versions, FortiDeceptor 4.3 all versions, FortiDeceptor 4.2 all versions, FortiDeceptor 4.1 all versions, FortiDeceptor 4.0 all versions, FortiDeceptor 3.3 all versions, FortiDeceptor 3.2 all versions, FortiDeceptor 3.1 all versions, FortiDeceptor 3.0 all versions may allow an attacker to perform a reflected cross-site scripting attack in the recovery endpoints

AI-Powered Analysis

AILast updated: 02/04/2026, 14:00:01 UTC

Technical Analysis

CVE-2024-35280 is a reflected cross-site scripting (XSS) vulnerability identified in Fortinet's FortiDeceptor product, spanning versions 3.0.0 through 5.3.0. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages, specifically in the recovery endpoints of the FortiDeceptor web interface. This improper input handling allows an attacker to craft malicious URLs that, when visited by an authenticated or unauthenticated user, can execute arbitrary scripts in the victim's browser context. The vulnerability does not require prior authentication but does require user interaction, such as clicking a malicious link. The impact primarily affects confidentiality and integrity by potentially exposing session tokens, enabling unauthorized actions, or manipulating displayed content. Availability is not directly impacted. The CVSS 3.1 base score is 5.1, reflecting medium severity with network attack vector, low attack complexity, no privileges required, user interaction needed, and partial confidentiality and integrity impact. No public exploits or active exploitation have been reported to date. FortiDeceptor is a deception technology platform used to detect and analyze cyber threats by deploying decoys and traps within networks. Exploitation of this vulnerability could allow attackers to bypass some security controls or gather intelligence by manipulating the interface or stealing session information. Given the broad range of affected versions, many deployments may be vulnerable if not updated. Fortinet has not yet published patches or mitigation guidance, so organizations must implement interim controls to reduce risk.

Potential Impact

For European organizations, the impact of CVE-2024-35280 includes potential exposure of sensitive session information and unauthorized command execution within the FortiDeceptor management interface. This could undermine the effectiveness of deception-based security controls, allowing attackers to evade detection or manipulate decoy systems. Confidentiality and integrity of the FortiDeceptor environment may be compromised, potentially leading to broader network reconnaissance or lateral movement if attackers leverage the vulnerability as part of a multi-stage attack. While availability is not directly affected, the loss of trust in deception data could impair incident response capabilities. Organizations in critical infrastructure sectors, finance, and government relying on FortiDeceptor for advanced threat detection may face increased risk of targeted attacks. The requirement for user interaction limits mass exploitation but social engineering or phishing campaigns could facilitate attacks. The absence of known exploits reduces immediate risk but does not preclude future weaponization. Overall, the vulnerability poses a moderate threat to European entities using FortiDeceptor, especially those with high-value assets or regulatory compliance requirements around cybersecurity.

Mitigation Recommendations

1. Monitor Fortinet advisories closely for official patches or updates addressing CVE-2024-35280 and apply them promptly upon release. 2. Implement strict input validation and output encoding on any custom integrations or web interfaces interacting with FortiDeceptor recovery endpoints to reduce XSS risk. 3. Deploy Web Application Firewalls (WAFs) with rules designed to detect and block reflected XSS attack patterns targeting FortiDeceptor URLs. 4. Educate users and administrators about the risks of clicking unsolicited or suspicious links, especially those purporting to be related to FortiDeceptor management. 5. Restrict access to FortiDeceptor web interfaces to trusted networks and VPNs to reduce exposure to external attackers. 6. Enable multi-factor authentication (MFA) for FortiDeceptor management accounts to mitigate session hijacking risks. 7. Regularly audit FortiDeceptor logs and monitor for anomalous web requests or unusual user activity indicative of exploitation attempts. 8. Consider network segmentation to isolate deception infrastructure from general user environments, limiting the impact of any compromise. 9. If possible, disable or limit the use of recovery endpoints until patches are available or risk is mitigated. 10. Maintain an incident response plan that includes scenarios involving compromise of deception technology components.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2024-05-14T21:15:19.190Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69834d77f9fa50a62f8e393e

Added to database: 2/4/2026, 1:45:27 PM

Last enriched: 2/4/2026, 2:00:01 PM

Last updated: 2/6/2026, 7:43:35 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats