Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47570: Escalation of privilege in Fortinet FortiProxy

0
Medium
VulnerabilityCVE-2024-47570cvecve-2024-47570
Published: Tue Dec 09 2025 (12/09/2025, 17:20:42 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiProxy

Description

An insertion of sensitive information into log file vulnerability [CWE-532] in FortiOS 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0 all versions; FortiProxy 7.4.0 through 7.4.3, 7.2.0 through 7.2.11; FortiPAM 1.4 all versions, 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions and FortiSRA 1.4 all versions may allow a read-only administrator to retrieve API tokens of other administrators via observing REST API logs, if REST API logging is enabled (non-default configuration).

AI-Powered Analysis

AILast updated: 12/09/2025, 17:53:13 UTC

Technical Analysis

CVE-2024-47570 is a vulnerability identified in Fortinet's FortiProxy, FortiOS, FortiPAM, and FortiSRA products that allows a read-only administrator to escalate privileges by retrieving API tokens of other administrators. The root cause is the insertion of sensitive information, specifically API tokens, into REST API logs when REST API logging is enabled—a configuration that is not enabled by default. This vulnerability is classified under CWE-532, which concerns the exposure of sensitive information through logs. The affected versions include FortiOS 7.0 through 7.4.3, FortiProxy 7.2.0 through 7.4.3, and all versions of FortiPAM and FortiSRA 1.4. Since the REST API logs contain sensitive tokens, a read-only administrator with access to these logs can extract API tokens belonging to other administrators, potentially allowing them to perform actions beyond their intended permissions. The vulnerability requires that REST API logging be enabled, which is a deliberate configuration change, and that the attacker already has read-only administrator access, which limits the ease of exploitation. The CVSS 3.1 base score is 6.3, indicating a medium severity with high impact on confidentiality, integrity, and availability if exploited. No public exploits have been reported to date, but the vulnerability poses a risk in environments where REST API logging is enabled and access controls are insufficiently restrictive.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized privilege escalation within Fortinet security infrastructure, potentially compromising network security management and monitoring. If an attacker gains access to API tokens of higher-privileged administrators, they could manipulate firewall rules, proxy configurations, or access sensitive data, undermining confidentiality, integrity, and availability of critical security functions. This risk is particularly significant for large enterprises, government agencies, and critical infrastructure operators that rely heavily on Fortinet products for perimeter defense and secure remote access. The requirement for REST API logging to be enabled reduces the immediate risk but also highlights the importance of secure logging practices. Organizations with multiple administrators and complex access hierarchies are at greater risk if access controls are not tightly enforced. Additionally, the exposure of API tokens could facilitate lateral movement within networks, increasing the potential impact of a breach.

Mitigation Recommendations

1. Immediately review and disable REST API logging on Fortinet products unless it is strictly necessary for operational or compliance reasons. 2. If REST API logging must be enabled, restrict read-only administrator access to logs containing sensitive information using strict role-based access controls and network segmentation. 3. Rotate API tokens regularly and enforce strong authentication mechanisms for all administrator accounts to limit the window of opportunity for token misuse. 4. Monitor logs for unusual access patterns or attempts to retrieve API tokens. 5. Apply any available patches or updates from Fortinet as soon as they are released addressing this vulnerability. 6. Conduct a thorough audit of administrator privileges and remove unnecessary read-only admin accounts. 7. Educate security teams about the risks of sensitive data exposure in logs and implement secure logging best practices, including log encryption and access controls. 8. Consider deploying additional monitoring tools to detect anomalous API usage that could indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2024-09-27T16:19:24.136Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69385e4c74ebaa3baba14001

Added to database: 12/9/2025, 5:37:16 PM

Last enriched: 12/9/2025, 5:53:13 PM

Last updated: 12/11/2025, 2:04:11 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats