Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45324: Execute unauthorized code or commands in Fortinet FortiPAM

0
High
VulnerabilityCVE-2024-45324cvecve-2024-45324
Published: Tue Mar 11 2025 (03/11/2025, 14:54:33 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiPAM

Description

A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.0 through 7.4.4, version 7.2.0 through 7.2.9, version 7.0.0 through 7.0.15 and before 6.4.15, FortiProxy version 7.4.0 through 7.4.6, version 7.2.0 through 7.2.12 and before 7.0.19, FortiPAM version 1.4.0 through 1.4.2 and before 1.3.1, FortiSRA version 1.4.0 through 1.4.2 and before 1.3.1 and FortiWeb version 7.4.0 through 7.4.5, version 7.2.0 through 7.2.10 and before 7.0.10 allows a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands.

AI-Powered Analysis

AILast updated: 01/14/2026, 14:52:50 UTC

Technical Analysis

CVE-2024-45324 is a vulnerability classified as a use of externally-controlled format string (CWE-134) affecting multiple Fortinet products, including FortiPAM, FortiOS, FortiProxy, FortiSRA, and FortiWeb. The flaw exists in specific versions of these products, notably FortiPAM versions 1.4.0 through 1.4.2 and earlier. The vulnerability allows a privileged attacker to execute unauthorized code or commands by sending specially crafted HTTP or HTTPS requests to the affected device. The root cause is improper handling of format strings that can be externally influenced, leading to potential memory corruption and arbitrary code execution. The vulnerability requires the attacker to have high privileges on the device but does not require user interaction, making it exploitable remotely over the network. The CVSS v3.1 base score is 7.0, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction needed. Although no known exploits are currently reported in the wild, the vulnerability's nature and affected products make it a significant risk, especially for organizations relying on Fortinet's security and PAM solutions. The vulnerability affects a broad range of Fortinet versions, indicating that many deployments could be vulnerable if not updated. The flaw could allow attackers to gain control over critical security infrastructure, potentially leading to further network compromise or data breaches.

Potential Impact

For European organizations, the impact of CVE-2024-45324 can be severe due to the widespread use of Fortinet products in enterprise and critical infrastructure environments. Successful exploitation could lead to unauthorized code execution on devices responsible for privileged access management, network security, and web application protection. This could result in full compromise of affected devices, exposing sensitive credentials, disrupting network operations, and enabling lateral movement within networks. The confidentiality, integrity, and availability of critical systems could be compromised, leading to data breaches, operational downtime, and loss of trust. Given the high privileges required, the threat is more relevant to insider threats or attackers who have already gained some level of access. However, the remote exploitability via network protocols increases the risk surface. European sectors such as finance, energy, government, and telecommunications, which heavily rely on Fortinet solutions, could face significant operational and reputational damage if targeted. The absence of known exploits in the wild provides a window for proactive mitigation, but the potential for rapid weaponization remains.

Mitigation Recommendations

1. Immediate patching: Apply the latest security updates from Fortinet for all affected products and versions, prioritizing FortiPAM and FortiOS deployments. 2. Privilege management: Restrict administrative access to Fortinet devices to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication. 3. Network segmentation: Isolate management interfaces of Fortinet devices from general network traffic and restrict access via firewalls and access control lists to known IP addresses. 4. Monitor logs: Enable detailed logging and monitor for unusual HTTP/HTTPS requests or commands targeting Fortinet devices, focusing on indicators of exploitation attempts. 5. Incident response readiness: Prepare and test incident response plans specifically for potential compromise of privileged access management and network security devices. 6. Vulnerability scanning: Regularly scan Fortinet devices for outdated versions and configuration weaknesses. 7. Disable unnecessary services: Turn off any unused HTTP/HTTPS management interfaces or services on Fortinet devices to reduce attack surface. 8. Vendor communication: Stay updated with Fortinet advisories and subscribe to threat intelligence feeds for emerging exploit information related to CVE-2024-45324.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2024-08-27T06:43:07.250Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f0c1e29f8a5dbaeac5cdaf

Added to database: 10/16/2025, 9:58:58 AM

Last enriched: 1/14/2026, 2:52:50 PM

Last updated: 1/19/2026, 9:26:34 AM

Views: 158

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats