Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47570: Escalation of privilege in Fortinet FortiSASE

0
Medium
VulnerabilityCVE-2024-47570cvecve-2024-47570
Published: Tue Dec 09 2025 (12/09/2025, 17:20:42 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiSASE

Description

An insertion of sensitive information into log file vulnerability [CWE-532] in FortiOS 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0 all versions; FortiProxy 7.4.0 through 7.4.3, 7.2.0 through 7.2.11; FortiPAM 1.4 all versions, 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions and FortiSRA 1.4 all versions may allow a read-only administrator to retrieve API tokens of other administrators via observing REST API logs, if REST API logging is enabled (non-default configuration).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:33:21 UTC

Technical Analysis

CVE-2024-47570 is a vulnerability identified in Fortinet’s FortiSASE and other related products such as FortiOS, FortiProxy, FortiPAM, and FortiSRA. The issue arises from the insertion of sensitive information—specifically API tokens—into REST API log files when REST API logging is enabled, which is not enabled by default. This vulnerability is categorized under CWE-532, indicating exposure of sensitive information through logs. A read-only administrator, who normally has limited privileges, can exploit this by accessing the REST API logs and extracting API tokens belonging to other administrators. These tokens can then be used to escalate privileges or perform unauthorized actions within the system. The vulnerability affects multiple versions: FortiOS 7.0 through 7.4.3, FortiProxy 7.2.0 through 7.4.3, FortiPAM versions 1.0 through 1.4, and FortiSRA 1.4. The CVSS v3.1 base score is 6.3, reflecting medium severity, with attack vector being network-based but requiring high privileges (read-only admin) and no user interaction. The impact on confidentiality, integrity, and availability is high if exploited, as it could lead to unauthorized administrative access. No public exploits are known, and no patches are linked yet, but Fortinet has published the advisory. The vulnerability is significant because it exposes sensitive authentication tokens through logs, which are often overlooked as an attack surface.

Potential Impact

If exploited, this vulnerability allows a read-only administrator to access API tokens of other administrators, potentially enabling privilege escalation and unauthorized administrative actions. This can compromise the confidentiality and integrity of the affected systems, allowing attackers to manipulate configurations, access sensitive data, or disrupt services. Given that Fortinet products are widely used in enterprise network security, the impact could extend to critical infrastructure, corporate networks, and managed security services. The vulnerability could facilitate lateral movement within networks and undermine trust in security controls. Although exploitation requires existing read-only admin access and REST API logging enabled, the exposure of API tokens significantly raises the risk profile. Organizations relying on Fortinet products for perimeter and internal security could face increased risk of insider threats or compromised administrative accounts if this vulnerability is not mitigated.

Mitigation Recommendations

Organizations should immediately audit their Fortinet product deployments to determine if REST API logging is enabled, as this is a non-default configuration that triggers the vulnerability. If logging is enabled, consider disabling it until a patch is available or restrict access to log files strictly to trusted personnel. Fortinet customers should monitor for official patches or updates addressing CVE-2024-47570 and apply them promptly once released. Implement strict role-based access controls (RBAC) to limit read-only administrator privileges and monitor for unusual access patterns to REST API logs. Additionally, rotate API tokens and credentials regularly to reduce the window of exposure. Employ network segmentation and monitoring to detect potential misuse of administrative tokens. Finally, review logging policies to avoid storing sensitive information in logs or ensure logs are encrypted and access-controlled.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2024-09-27T16:19:24.136Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69385e4c74ebaa3baba14001

Added to database: 12/9/2025, 5:37:16 PM

Last enriched: 2/27/2026, 4:33:21 AM

Last updated: 3/25/2026, 1:37:20 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses