Skip to main content

CVE-2024-45329: Improper access control in Fortinet FortiPortal

Low
VulnerabilityCVE-2024-45329cvecve-2024-45329
Published: Tue Jun 10 2025 (06/10/2025, 16:36:06 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiPortal

Description

A authorization bypass through user-controlled key in Fortinet FortiPortal versions 7.4.0, versions 7.2.0 through 7.2.5, and versions 7.0.0 through 7.0.8 may allow an authenticated attacker to view unauthorized device information via key modification in API requests.

AI-Powered Analysis

AILast updated: 07/11/2025, 22:48:44 UTC

Technical Analysis

CVE-2024-45329 is a vulnerability identified in Fortinet's FortiPortal product, specifically affecting versions 7.4.0, 7.2.0 through 7.2.5, and 7.0.0 through 7.0.8. The vulnerability arises from improper access control due to an authorization bypass mechanism. An authenticated attacker with legitimate access to the FortiPortal system can exploit this flaw by manipulating a user-controlled key parameter within API requests. This manipulation allows the attacker to view device information that they are not authorized to access. The vulnerability does not require user interaction beyond authentication, and it can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), and the attacker must have some privileges (PR:L) but no elevated privileges are required. The vulnerability impacts confidentiality by exposing unauthorized device information but does not affect integrity or availability. The CVSS v3.1 base score is 3.9, indicating a low severity level. There are no known exploits in the wild at the time of publication, and no patches or mitigation links have been provided yet. This vulnerability highlights a weakness in FortiPortal's API authorization checks, potentially allowing lateral information gathering within a network environment where FortiPortal is deployed.

Potential Impact

For European organizations using Fortinet FortiPortal, this vulnerability could lead to unauthorized disclosure of sensitive device information managed through the portal. Such information could include device configurations, network topology details, or other metadata that an attacker could leverage for further reconnaissance or targeted attacks. Although the vulnerability does not directly allow modification or disruption of services, the exposure of device information can aid attackers in planning more sophisticated attacks, potentially compromising network security. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, may face compliance risks if unauthorized data disclosure occurs. The impact is somewhat mitigated by the requirement for attacker authentication, limiting exploitation to insiders or compromised accounts. However, given FortiPortal's role in managing network devices, even limited unauthorized access can have cascading effects on network security posture.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately review and restrict access controls to FortiPortal, ensuring that only necessary personnel have authenticated access, and enforce the principle of least privilege. 2) Monitor API request logs for unusual or unauthorized key modifications that could indicate exploitation attempts. 3) Employ network segmentation to isolate FortiPortal management interfaces from general user networks, reducing the risk of unauthorized access. 4) Stay alert for official patches or updates from Fortinet addressing CVE-2024-45329 and apply them promptly once available. 5) Conduct internal audits and penetration testing focusing on API authorization mechanisms to detect similar weaknesses. 6) Implement multi-factor authentication (MFA) for FortiPortal access to reduce the risk of credential compromise. 7) Educate administrators about the risks of API misuse and encourage reporting of suspicious activities related to FortiPortal.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2024-08-27T06:43:07.250Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f521b0bd07c39389d72

Added to database: 6/10/2025, 6:54:10 PM

Last enriched: 7/11/2025, 10:48:44 PM

Last updated: 7/31/2025, 1:01:29 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats