Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46669: Denial of service in Fortinet FortiOS

0
Low
VulnerabilityCVE-2024-46669cvecve-2024-46669
Published: Tue Jan 14 2025 (01/14/2025, 14:08:37 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiOS

Description

CVE-2024-46669 is an integer overflow vulnerability in Fortinet FortiOS versions 7. 4. 4 and below, 7. 2. 10 and below, and FortiSASE version 23. 4. b affecting the IPsec IKE service. An authenticated attacker with low privileges can send crafted requests to cause a denial of service by crashing the IPsec tunnel. The vulnerability does not impact confidentiality or integrity but affects availability. Exploitation requires authentication but no user interaction.

AI-Powered Analysis

AILast updated: 01/14/2026, 09:47:19 UTC

Technical Analysis

CVE-2024-46669 is a vulnerability classified as an integer overflow or wraparound (CWE-190) found in Fortinet FortiOS versions 7.4.4 and below, 7.2.10 and below, and FortiSASE version 23.4.b. The flaw exists within the IPsec Internet Key Exchange (IKE) service component, which is responsible for establishing and maintaining secure IPsec tunnels. An authenticated attacker with low privileges can craft specific requests that trigger an integer overflow condition, causing the IPsec IKE service to crash. This results in a denial of service (DoS) condition by disrupting the IPsec tunnel, potentially interrupting secure communications. The vulnerability does not affect confidentiality or integrity of data but impacts availability by causing service outages. Exploitation requires the attacker to be authenticated on the device but does not require user interaction, making it a remote attack vector with limited complexity. The CVSS v3.1 base score is 3.2, indicating a low severity primarily due to the requirement for authentication and limited impact scope. No public exploits or active exploitation have been reported to date. Fortinet has not provided patch links in the provided data, but affected organizations should monitor vendor advisories for updates. The vulnerability is relevant to environments using Fortinet FortiOS for VPN and IPsec services, which are common in enterprise and service provider networks.

Potential Impact

The primary impact of CVE-2024-46669 is a denial of service condition that disrupts IPsec VPN tunnels, affecting availability of secure communications. For European organizations, this can lead to temporary loss of connectivity between sites or remote users relying on Fortinet FortiOS-based IPsec VPNs. Critical infrastructure, government agencies, and enterprises using Fortinet devices for secure network segmentation or remote access may experience operational disruptions. Although the confidentiality and integrity of data are not compromised, the loss of availability can impact business continuity, especially in sectors requiring high uptime such as finance, healthcare, and public services. The requirement for authentication limits the attack surface to insiders or compromised accounts, reducing the likelihood of widespread exploitation. However, persistent or targeted attacks could degrade network reliability and trust in VPN services. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance and patching.

Mitigation Recommendations

1. Apply vendor-provided patches or updates as soon as they become available to address the integer overflow vulnerability in FortiOS and FortiSASE. 2. Restrict administrative access to Fortinet devices to trusted personnel and networks to reduce the risk of authenticated attackers exploiting the flaw. 3. Implement strong authentication mechanisms, such as multi-factor authentication (MFA), to protect access to Fortinet management interfaces. 4. Monitor IPsec tunnel stability and logs for unusual disconnections or crashes that may indicate exploitation attempts. 5. Conduct regular vulnerability assessments and penetration tests focusing on VPN infrastructure to identify potential weaknesses. 6. Segment management networks and enforce least privilege principles to limit the impact of compromised credentials. 7. Maintain up-to-date incident response plans that include procedures for handling VPN service disruptions. 8. Engage with Fortinet support and subscribe to security advisories to receive timely information on patches and mitigations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2024-09-11T12:14:59.204Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696762bf8330e0671657350d

Added to database: 1/14/2026, 9:32:47 AM

Last enriched: 1/14/2026, 9:47:19 AM

Last updated: 1/14/2026, 10:35:54 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats