Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47569: Information disclosure in Fortinet FortiManager Cloud

0
Medium
VulnerabilityCVE-2024-47569cvecve-2024-47569
Published: Tue Oct 14 2025 (10/14/2025, 15:23:03 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiManager Cloud

Description

A insertion of sensitive information into sent data vulnerability in Fortinet FortiMail 7.4.0 through 7.4.2, FortiMail 7.2.0 through 7.2.6, FortiMail 7.0 all versions, FortiManager 7.6.0 through 7.6.1, FortiManager 7.4.1 through 7.4.3, FortiManager Cloud 7.4.1 through 7.4.3, FortiNDR 7.6.0 through 7.6.1, FortiNDR 7.4.0 through 7.4.8, FortiNDR 7.2 all versions, FortiNDR 7.1 all versions, FortiNDR 7.0 all versions, FortiNDR 1.5 all versions, FortiOS 7.6.0, FortiOS 7.4.0 through 7.4.4, FortiOS 7.2.0 through 7.2.8, FortiOS 7.0.0 through 7.0.15, FortiOS 6.4.0 through 6.4.15, FortiOS 6.2 all versions, FortiOS 6.0 all versions, FortiPAM 1.3 all versions, FortiPAM 1.2 all versions, FortiPAM 1.1 all versions, FortiPAM 1.0 all versions, FortiProxy 7.4.0 through 7.4.4, FortiProxy 7.2.0 through 7.2.10, FortiProxy 7.0 all versions, FortiProxy 2.0 all versions, FortiProxy 1.2 all versions, FortiProxy 1.1 all versions, FortiProxy 1.0 all versions, FortiRecorder 7.2.0 through 7.2.1, FortiRecorder 7.0.0 through 7.0.4, FortiTester 7.4.0 through 7.4.2, FortiTester 7.3 all versions, FortiTester 7.2 all versions, FortiTester 7.1 all versions, FortiTester 7.0 all versions, FortiTester 4.2 all versions, FortiVoice 7.0.0 through 7.0.4, FortiVoice 6.4.0 through 6.4.9, FortiVoice 6.0.7 through 6.0.12, FortiWeb 7.6.0, FortiWeb 7.4.0 through 7.4.4, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions, FortiWeb 6.4 all versions allows attacker to disclose sensitive information via specially crafted packets.

AI-Powered Analysis

AILast updated: 01/14/2026, 14:53:03 UTC

Technical Analysis

CVE-2024-47569 is an information disclosure vulnerability identified in Fortinet's FortiManager Cloud 7.4.1 and a broad range of other Fortinet products, including FortiMail, FortiNDR, FortiOS, FortiPAM, FortiProxy, FortiRecorder, FortiTester, FortiVoice, and FortiWeb across various versions. The vulnerability arises from the improper insertion of sensitive information into data packets sent by these products. An attacker with network access and low privileges can craft specific packets that trigger the leakage of sensitive information from the affected systems. The vulnerability does not require user interaction but does require some level of authentication, limiting the attack surface to authenticated users or internal threat actors. The CVSS v3.1 base score is 4.2, reflecting a medium severity primarily due to the confidentiality impact without affecting integrity or availability. The flaw is exploitable remotely over the network with low attack complexity. Although no public exploits are currently known, the wide range of affected Fortinet products and versions increases the risk profile. The vulnerability could expose sensitive configuration data, credentials, or operational details that attackers could leverage for further attacks or lateral movement within networks.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive information leakage from critical network security infrastructure, potentially exposing configuration details, credentials, or other confidential data. This could facilitate further targeted attacks, privilege escalation, or lateral movement within enterprise networks. Organizations relying heavily on Fortinet products for network security, email security, and access management are particularly at risk. The confidentiality breach could lead to compliance violations under GDPR if personal data or sensitive business information is exposed. Although the vulnerability does not directly impact system integrity or availability, the indirect consequences of leaked information could be severe, including reputational damage and operational disruption. The requirement for authentication limits exposure to internal or compromised users, but insider threats or attackers who have gained initial access could exploit this vulnerability to escalate their privileges or gather intelligence.

Mitigation Recommendations

European organizations should immediately verify if their Fortinet products, especially FortiManager Cloud version 7.4.1 and other listed affected versions, are deployed in their environments. They should apply vendor-provided patches or updates as soon as they become available. In the absence of patches, organizations should restrict network access to management interfaces to trusted administrators only, ideally via VPN or secure jump hosts. Implement strict network segmentation to isolate management and security infrastructure from general user networks. Monitor network traffic for anomalous or specially crafted packets targeting Fortinet devices. Employ enhanced logging and alerting on authentication attempts and unusual data transmissions from affected products. Conduct regular audits of user privileges to minimize the number of users with access to vulnerable systems. Additionally, review and harden configurations to reduce unnecessary exposure of sensitive data. Finally, maintain up-to-date incident response plans to quickly address any potential exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2024-09-27T16:19:24.136Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee702b75ce224a0426b549

Added to database: 10/14/2025, 3:45:47 PM

Last enriched: 1/14/2026, 2:53:03 PM

Last updated: 1/19/2026, 12:02:05 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats