Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47569: Information disclosure in Fortinet FortiManager Cloud

0
Medium
VulnerabilityCVE-2024-47569cvecve-2024-47569
Published: Tue Oct 14 2025 (10/14/2025, 15:23:03 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiManager Cloud

Description

A insertion of sensitive information into sent data vulnerability in Fortinet FortiMail 7.4.0 through 7.4.2, FortiMail 7.2.0 through 7.2.6, FortiMail 7.0 all versions, FortiManager 7.6.0 through 7.6.1, FortiManager 7.4.1 through 7.4.3, FortiManager Cloud 7.4.1 through 7.4.3, FortiNDR 7.6.0 through 7.6.1, FortiNDR 7.4.0 through 7.4.8, FortiNDR 7.2 all versions, FortiNDR 7.1 all versions, FortiNDR 7.0 all versions, FortiNDR 1.5 all versions, FortiOS 7.6.0, FortiOS 7.4.0 through 7.4.4, FortiOS 7.2.0 through 7.2.8, FortiOS 7.0.0 through 7.0.15, FortiOS 6.4.0 through 6.4.15, FortiOS 6.2 all versions, FortiOS 6.0 all versions, FortiPAM 1.3 all versions, FortiPAM 1.2 all versions, FortiPAM 1.1 all versions, FortiPAM 1.0 all versions, FortiProxy 7.4.0 through 7.4.4, FortiProxy 7.2.0 through 7.2.10, FortiProxy 7.0 all versions, FortiProxy 2.0 all versions, FortiProxy 1.2 all versions, FortiProxy 1.1 all versions, FortiProxy 1.0 all versions, FortiRecorder 7.2.0 through 7.2.1, FortiRecorder 7.0.0 through 7.0.4, FortiTester 7.4.0 through 7.4.2, FortiTester 7.3 all versions, FortiTester 7.2 all versions, FortiTester 7.1 all versions, FortiTester 7.0 all versions, FortiTester 4.2 all versions, FortiVoice 7.0.0 through 7.0.4, FortiVoice 6.4.0 through 6.4.9, FortiVoice 6.0.7 through 6.0.12, FortiWeb 7.6.0, FortiWeb 7.4.0 through 7.4.4, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions, FortiWeb 6.4 all versions allows attacker to disclose sensitive information via specially crafted packets.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 10:21:15 UTC

Technical Analysis

CVE-2024-47569 is an information disclosure vulnerability identified in several Fortinet products, notably FortiManager Cloud 7.4.1, FortiMail, FortiNDR, FortiOS, FortiPAM, FortiProxy, FortiRecorder, FortiTester, FortiVoice, and FortiWeb across various versions. The vulnerability arises from the insertion of sensitive information into data packets sent by the affected devices. An attacker with network-level access and low privileges can craft specific packets to trigger the leakage of sensitive information. The vulnerability does not require user interaction but does require some level of authentication, limiting the attack surface to authenticated users or internal threat actors. The CVSS v3.1 score is 4.2 (medium), reflecting the limited impact on confidentiality without affecting integrity or availability. The vulnerability is exploitable remotely over the network, with low attack complexity. Although no known exploits are reported in the wild, the broad range of affected Fortinet products and versions indicates a significant potential exposure. Fortinet has published the vulnerability details but no patch links are currently provided, suggesting that mitigation may rely on configuration changes or upcoming patches. The vulnerability could expose sensitive configuration data or operational information, which could be leveraged for further attacks or reconnaissance.

Potential Impact

For European organizations, the impact of CVE-2024-47569 is primarily the unauthorized disclosure of sensitive information, which could include configuration details, credentials, or operational data from Fortinet security infrastructure. This exposure can facilitate lateral movement, privilege escalation, or targeted attacks against critical network components. Organizations relying heavily on Fortinet products for network security, especially FortiManager Cloud for centralized management, face increased risk of data leakage. The breach of confidentiality could undermine compliance with GDPR and other data protection regulations, leading to legal and reputational consequences. Since the vulnerability requires authentication, insider threats or compromised credentials pose a significant risk vector. The broad product impact means that organizations with diverse Fortinet deployments must assess multiple systems for exposure. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once details are public. The medium severity rating suggests that while the vulnerability is not critical, it warrants timely remediation to prevent escalation.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately inventory all Fortinet products in use, focusing on FortiManager Cloud 7.4.1 and other affected versions listed. 2) Apply any available patches or firmware updates from Fortinet as soon as they are released. 3) Restrict network access to management interfaces using segmentation, VPNs, or firewall rules to limit exposure to trusted administrators only. 4) Enforce strong authentication mechanisms and monitor for unusual login activity to reduce risk from compromised credentials. 5) Enable detailed logging and alerting on Fortinet devices to detect anomalous packet traffic indicative of exploitation attempts. 6) Conduct regular security audits and vulnerability scans focusing on Fortinet infrastructure. 7) If patches are not yet available, consider temporary workarounds such as disabling vulnerable services or features where feasible. 8) Train security teams on the specifics of this vulnerability to improve detection and response capabilities. 9) Coordinate with Fortinet support for guidance and early access to fixes. 10) Review and update incident response plans to include scenarios involving Fortinet product compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2024-09-27T16:19:24.136Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee702b75ce224a0426b549

Added to database: 10/14/2025, 3:45:47 PM

Last enriched: 2/10/2026, 10:21:15 AM

Last updated: 3/25/2026, 3:12:42 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses