CVE-2024-46669: Denial of service in Fortinet FortiOS
CVE-2024-46669 is an integer overflow vulnerability in Fortinet FortiOS versions 7. 4. 4 and below, 7. 2. 10 and below, and FortiSASE version 23. 4. b affecting the IPsec IKE service. An authenticated attacker with low privileges can send crafted requests to cause a denial of service by crashing the IPsec tunnel. The vulnerability does not impact confidentiality or integrity but affects availability. Exploitation requires authentication but no user interaction.
AI Analysis
Technical Summary
CVE-2024-46669 is a vulnerability classified as an integer overflow or wraparound (CWE-190) found in Fortinet FortiOS versions 7.4.4 and below, 7.2.10 and below, and FortiSASE version 23.4.b. The flaw exists within the IPsec Internet Key Exchange (IKE) service component, which is responsible for establishing and maintaining secure IPsec tunnels. An authenticated attacker with low privileges can craft specific requests that trigger an integer overflow condition, causing the IPsec IKE service to crash. This results in a denial of service (DoS) condition by disrupting the IPsec tunnel, potentially interrupting secure communications. The vulnerability does not affect confidentiality or integrity of data but impacts availability by causing service outages. Exploitation requires the attacker to be authenticated on the device but does not require user interaction, making it a remote attack vector with limited complexity. The CVSS v3.1 base score is 3.2, indicating a low severity primarily due to the requirement for authentication and limited impact scope. No public exploits or active exploitation have been reported to date. Fortinet has not provided patch links in the provided data, but affected organizations should monitor vendor advisories for updates. The vulnerability is relevant to environments using Fortinet FortiOS for VPN and IPsec services, which are common in enterprise and service provider networks.
Potential Impact
The primary impact of CVE-2024-46669 is a denial of service condition that disrupts IPsec VPN tunnels, affecting availability of secure communications. For European organizations, this can lead to temporary loss of connectivity between sites or remote users relying on Fortinet FortiOS-based IPsec VPNs. Critical infrastructure, government agencies, and enterprises using Fortinet devices for secure network segmentation or remote access may experience operational disruptions. Although the confidentiality and integrity of data are not compromised, the loss of availability can impact business continuity, especially in sectors requiring high uptime such as finance, healthcare, and public services. The requirement for authentication limits the attack surface to insiders or compromised accounts, reducing the likelihood of widespread exploitation. However, persistent or targeted attacks could degrade network reliability and trust in VPN services. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance and patching.
Mitigation Recommendations
1. Apply vendor-provided patches or updates as soon as they become available to address the integer overflow vulnerability in FortiOS and FortiSASE. 2. Restrict administrative access to Fortinet devices to trusted personnel and networks to reduce the risk of authenticated attackers exploiting the flaw. 3. Implement strong authentication mechanisms, such as multi-factor authentication (MFA), to protect access to Fortinet management interfaces. 4. Monitor IPsec tunnel stability and logs for unusual disconnections or crashes that may indicate exploitation attempts. 5. Conduct regular vulnerability assessments and penetration tests focusing on VPN infrastructure to identify potential weaknesses. 6. Segment management networks and enforce least privilege principles to limit the impact of compromised credentials. 7. Maintain up-to-date incident response plans that include procedures for handling VPN service disruptions. 8. Engage with Fortinet support and subscribe to security advisories to receive timely information on patches and mitigations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2024-46669: Denial of service in Fortinet FortiOS
Description
CVE-2024-46669 is an integer overflow vulnerability in Fortinet FortiOS versions 7. 4. 4 and below, 7. 2. 10 and below, and FortiSASE version 23. 4. b affecting the IPsec IKE service. An authenticated attacker with low privileges can send crafted requests to cause a denial of service by crashing the IPsec tunnel. The vulnerability does not impact confidentiality or integrity but affects availability. Exploitation requires authentication but no user interaction.
AI-Powered Analysis
Technical Analysis
CVE-2024-46669 is a vulnerability classified as an integer overflow or wraparound (CWE-190) found in Fortinet FortiOS versions 7.4.4 and below, 7.2.10 and below, and FortiSASE version 23.4.b. The flaw exists within the IPsec Internet Key Exchange (IKE) service component, which is responsible for establishing and maintaining secure IPsec tunnels. An authenticated attacker with low privileges can craft specific requests that trigger an integer overflow condition, causing the IPsec IKE service to crash. This results in a denial of service (DoS) condition by disrupting the IPsec tunnel, potentially interrupting secure communications. The vulnerability does not affect confidentiality or integrity of data but impacts availability by causing service outages. Exploitation requires the attacker to be authenticated on the device but does not require user interaction, making it a remote attack vector with limited complexity. The CVSS v3.1 base score is 3.2, indicating a low severity primarily due to the requirement for authentication and limited impact scope. No public exploits or active exploitation have been reported to date. Fortinet has not provided patch links in the provided data, but affected organizations should monitor vendor advisories for updates. The vulnerability is relevant to environments using Fortinet FortiOS for VPN and IPsec services, which are common in enterprise and service provider networks.
Potential Impact
The primary impact of CVE-2024-46669 is a denial of service condition that disrupts IPsec VPN tunnels, affecting availability of secure communications. For European organizations, this can lead to temporary loss of connectivity between sites or remote users relying on Fortinet FortiOS-based IPsec VPNs. Critical infrastructure, government agencies, and enterprises using Fortinet devices for secure network segmentation or remote access may experience operational disruptions. Although the confidentiality and integrity of data are not compromised, the loss of availability can impact business continuity, especially in sectors requiring high uptime such as finance, healthcare, and public services. The requirement for authentication limits the attack surface to insiders or compromised accounts, reducing the likelihood of widespread exploitation. However, persistent or targeted attacks could degrade network reliability and trust in VPN services. The absence of known exploits reduces immediate risk but does not eliminate the need for vigilance and patching.
Mitigation Recommendations
1. Apply vendor-provided patches or updates as soon as they become available to address the integer overflow vulnerability in FortiOS and FortiSASE. 2. Restrict administrative access to Fortinet devices to trusted personnel and networks to reduce the risk of authenticated attackers exploiting the flaw. 3. Implement strong authentication mechanisms, such as multi-factor authentication (MFA), to protect access to Fortinet management interfaces. 4. Monitor IPsec tunnel stability and logs for unusual disconnections or crashes that may indicate exploitation attempts. 5. Conduct regular vulnerability assessments and penetration tests focusing on VPN infrastructure to identify potential weaknesses. 6. Segment management networks and enforce least privilege principles to limit the impact of compromised credentials. 7. Maintain up-to-date incident response plans that include procedures for handling VPN service disruptions. 8. Engage with Fortinet support and subscribe to security advisories to receive timely information on patches and mitigations.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fortinet
- Date Reserved
- 2024-09-11T12:14:59.204Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696762bf8330e0671657350d
Added to database: 1/14/2026, 9:32:47 AM
Last enriched: 1/14/2026, 9:47:19 AM
Last updated: 1/14/2026, 10:35:54 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0532: CWE-918 Server-Side Request Forgery (SSRF) in Elastic Kibana
HighCVE-2026-0529: CWE-129 Improper Validation of Array Index in Elastic Packetbeat
MediumCVE-2024-46668: Denial of service in Fortinet FortiOS
HighCVE-2024-35282: Information disclosure in Fortinet FortiClientiOS
LowCVE-2026-0813: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in prasannasp Short Link
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.