CVE-2024-47570: Escalation of privilege in Fortinet FortiSASE
An insertion of sensitive information into log file vulnerability [CWE-532] in FortiOS 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0 all versions; FortiProxy 7.4.0 through 7.4.3, 7.2.0 through 7.2.11; FortiPAM 1.4 all versions, 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions and FortiSRA 1.4 all versions may allow a read-only administrator to retrieve API tokens of other administrators via observing REST API logs, if REST API logging is enabled (non-default configuration).
AI Analysis
Technical Summary
CVE-2024-47570 is a vulnerability identified in Fortinet’s FortiSASE and other related products such as FortiOS, FortiProxy, FortiPAM, and FortiSRA. The issue arises from the insertion of sensitive information—specifically API tokens—into REST API log files when REST API logging is enabled, which is not enabled by default. This vulnerability is categorized under CWE-532, indicating exposure of sensitive information through logs. A read-only administrator, who normally has limited privileges, can exploit this by accessing the REST API logs and extracting API tokens belonging to other administrators. These tokens can then be used to escalate privileges or perform unauthorized actions within the system. The vulnerability affects multiple versions: FortiOS 7.0 through 7.4.3, FortiProxy 7.2.0 through 7.4.3, FortiPAM versions 1.0 through 1.4, and FortiSRA 1.4. The CVSS v3.1 base score is 6.3, reflecting medium severity, with attack vector being network-based but requiring high privileges (read-only admin) and no user interaction. The impact on confidentiality, integrity, and availability is high if exploited, as it could lead to unauthorized administrative access. No public exploits are known, and no patches are linked yet, but Fortinet has published the advisory. The vulnerability is significant because it exposes sensitive authentication tokens through logs, which are often overlooked as an attack surface.
Potential Impact
If exploited, this vulnerability allows a read-only administrator to access API tokens of other administrators, potentially enabling privilege escalation and unauthorized administrative actions. This can compromise the confidentiality and integrity of the affected systems, allowing attackers to manipulate configurations, access sensitive data, or disrupt services. Given that Fortinet products are widely used in enterprise network security, the impact could extend to critical infrastructure, corporate networks, and managed security services. The vulnerability could facilitate lateral movement within networks and undermine trust in security controls. Although exploitation requires existing read-only admin access and REST API logging enabled, the exposure of API tokens significantly raises the risk profile. Organizations relying on Fortinet products for perimeter and internal security could face increased risk of insider threats or compromised administrative accounts if this vulnerability is not mitigated.
Mitigation Recommendations
Organizations should immediately audit their Fortinet product deployments to determine if REST API logging is enabled, as this is a non-default configuration that triggers the vulnerability. If logging is enabled, consider disabling it until a patch is available or restrict access to log files strictly to trusted personnel. Fortinet customers should monitor for official patches or updates addressing CVE-2024-47570 and apply them promptly once released. Implement strict role-based access controls (RBAC) to limit read-only administrator privileges and monitor for unusual access patterns to REST API logs. Additionally, rotate API tokens and credentials regularly to reduce the window of exposure. Employ network segmentation and monitoring to detect potential misuse of administrative tokens. Finally, review logging policies to avoid storing sensitive information in logs or ensure logs are encrypted and access-controlled.
Affected Countries
United States, Germany, United Kingdom, France, Japan, Australia, Canada, India, South Korea, Brazil
CVE-2024-47570: Escalation of privilege in Fortinet FortiSASE
Description
An insertion of sensitive information into log file vulnerability [CWE-532] in FortiOS 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0 all versions; FortiProxy 7.4.0 through 7.4.3, 7.2.0 through 7.2.11; FortiPAM 1.4 all versions, 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions and FortiSRA 1.4 all versions may allow a read-only administrator to retrieve API tokens of other administrators via observing REST API logs, if REST API logging is enabled (non-default configuration).
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-47570 is a vulnerability identified in Fortinet’s FortiSASE and other related products such as FortiOS, FortiProxy, FortiPAM, and FortiSRA. The issue arises from the insertion of sensitive information—specifically API tokens—into REST API log files when REST API logging is enabled, which is not enabled by default. This vulnerability is categorized under CWE-532, indicating exposure of sensitive information through logs. A read-only administrator, who normally has limited privileges, can exploit this by accessing the REST API logs and extracting API tokens belonging to other administrators. These tokens can then be used to escalate privileges or perform unauthorized actions within the system. The vulnerability affects multiple versions: FortiOS 7.0 through 7.4.3, FortiProxy 7.2.0 through 7.4.3, FortiPAM versions 1.0 through 1.4, and FortiSRA 1.4. The CVSS v3.1 base score is 6.3, reflecting medium severity, with attack vector being network-based but requiring high privileges (read-only admin) and no user interaction. The impact on confidentiality, integrity, and availability is high if exploited, as it could lead to unauthorized administrative access. No public exploits are known, and no patches are linked yet, but Fortinet has published the advisory. The vulnerability is significant because it exposes sensitive authentication tokens through logs, which are often overlooked as an attack surface.
Potential Impact
If exploited, this vulnerability allows a read-only administrator to access API tokens of other administrators, potentially enabling privilege escalation and unauthorized administrative actions. This can compromise the confidentiality and integrity of the affected systems, allowing attackers to manipulate configurations, access sensitive data, or disrupt services. Given that Fortinet products are widely used in enterprise network security, the impact could extend to critical infrastructure, corporate networks, and managed security services. The vulnerability could facilitate lateral movement within networks and undermine trust in security controls. Although exploitation requires existing read-only admin access and REST API logging enabled, the exposure of API tokens significantly raises the risk profile. Organizations relying on Fortinet products for perimeter and internal security could face increased risk of insider threats or compromised administrative accounts if this vulnerability is not mitigated.
Mitigation Recommendations
Organizations should immediately audit their Fortinet product deployments to determine if REST API logging is enabled, as this is a non-default configuration that triggers the vulnerability. If logging is enabled, consider disabling it until a patch is available or restrict access to log files strictly to trusted personnel. Fortinet customers should monitor for official patches or updates addressing CVE-2024-47570 and apply them promptly once released. Implement strict role-based access controls (RBAC) to limit read-only administrator privileges and monitor for unusual access patterns to REST API logs. Additionally, rotate API tokens and credentials regularly to reduce the window of exposure. Employ network segmentation and monitoring to detect potential misuse of administrative tokens. Finally, review logging policies to avoid storing sensitive information in logs or ensure logs are encrypted and access-controlled.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fortinet
- Date Reserved
- 2024-09-27T16:19:24.136Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69385e4c74ebaa3baba14001
Added to database: 12/9/2025, 5:37:16 PM
Last enriched: 2/27/2026, 4:33:21 AM
Last updated: 3/25/2026, 1:37:20 AM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.