CVE-2024-47570: Escalation of privilege in Fortinet FortiSASE
An insertion of sensitive information into log file vulnerability [CWE-532] in FortiOS 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0 all versions; FortiProxy 7.4.0 through 7.4.3, 7.2.0 through 7.2.11; FortiPAM 1.4 all versions, 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions and FortiSRA 1.4 all versions may allow a read-only administrator to retrieve API tokens of other administrators via observing REST API logs, if REST API logging is enabled (non-default configuration).
AI Analysis
Technical Summary
CVE-2024-47570 is a vulnerability identified in Fortinet's FortiSASE and other related products such as FortiOS, FortiProxy, FortiPAM, and FortiSRA across multiple versions. The issue arises from the insertion of sensitive information, specifically API tokens belonging to administrators, into REST API logs when REST API logging is enabled—a configuration that is not enabled by default. This vulnerability is classified under CWE-532, which relates to the exposure of sensitive information in logs. An attacker with read-only administrator privileges can access these logs and extract API tokens of other administrators, thereby potentially escalating their privileges beyond their intended access level. The vulnerability does not require user interaction but does require that REST API logging be enabled and that the attacker already has read-only admin access, which limits the initial attack surface. The CVSS 3.1 score of 6.3 reflects a medium severity, with high impact on confidentiality, integrity, and availability, and an attack vector over the network with high attack complexity and privileges required. No public exploits have been reported yet, but the vulnerability poses a risk of privilege escalation and unauthorized access to sensitive administrative functions. The affected versions span multiple Fortinet product lines, indicating a widespread potential impact for organizations using these products in their network security infrastructure.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to sensitive administrative API tokens, enabling attackers with read-only access to escalate privileges and potentially take over critical security infrastructure components. This could compromise network security, data confidentiality, and operational integrity. Organizations relying on Fortinet products for perimeter defense, secure access, and privileged access management could see disruptions or breaches if attackers exploit this vulnerability. The impact is particularly significant for sectors with stringent regulatory requirements such as finance, healthcare, and critical infrastructure, where unauthorized access could lead to data breaches, service outages, or compliance violations. Since REST API logging is not enabled by default, the risk is somewhat mitigated, but organizations that have enabled this feature for auditing or troubleshooting purposes are at heightened risk. The absence of known exploits in the wild provides a window for remediation, but the potential for privilege escalation makes timely patching or mitigation critical to prevent lateral movement and deeper network compromise.
Mitigation Recommendations
European organizations should first audit their Fortinet deployments to determine if REST API logging is enabled on affected products and versions. If logging is enabled, consider disabling it unless absolutely necessary or restrict access to logs strictly to trusted administrators. Apply the latest patches or updates from Fortinet as soon as they become available for the affected products and versions. Implement strict role-based access controls (RBAC) to minimize the number of administrators with read-only access and monitor administrative activities closely. Employ network segmentation and monitoring to detect unusual access patterns to administrative logs or API tokens. Use multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. Additionally, review and harden logging configurations to avoid logging sensitive information where possible. Conduct regular security assessments and penetration tests focusing on administrative interfaces and logging mechanisms to identify and remediate similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Switzerland
CVE-2024-47570: Escalation of privilege in Fortinet FortiSASE
Description
An insertion of sensitive information into log file vulnerability [CWE-532] in FortiOS 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0 all versions; FortiProxy 7.4.0 through 7.4.3, 7.2.0 through 7.2.11; FortiPAM 1.4 all versions, 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions and FortiSRA 1.4 all versions may allow a read-only administrator to retrieve API tokens of other administrators via observing REST API logs, if REST API logging is enabled (non-default configuration).
AI-Powered Analysis
Technical Analysis
CVE-2024-47570 is a vulnerability identified in Fortinet's FortiSASE and other related products such as FortiOS, FortiProxy, FortiPAM, and FortiSRA across multiple versions. The issue arises from the insertion of sensitive information, specifically API tokens belonging to administrators, into REST API logs when REST API logging is enabled—a configuration that is not enabled by default. This vulnerability is classified under CWE-532, which relates to the exposure of sensitive information in logs. An attacker with read-only administrator privileges can access these logs and extract API tokens of other administrators, thereby potentially escalating their privileges beyond their intended access level. The vulnerability does not require user interaction but does require that REST API logging be enabled and that the attacker already has read-only admin access, which limits the initial attack surface. The CVSS 3.1 score of 6.3 reflects a medium severity, with high impact on confidentiality, integrity, and availability, and an attack vector over the network with high attack complexity and privileges required. No public exploits have been reported yet, but the vulnerability poses a risk of privilege escalation and unauthorized access to sensitive administrative functions. The affected versions span multiple Fortinet product lines, indicating a widespread potential impact for organizations using these products in their network security infrastructure.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized access to sensitive administrative API tokens, enabling attackers with read-only access to escalate privileges and potentially take over critical security infrastructure components. This could compromise network security, data confidentiality, and operational integrity. Organizations relying on Fortinet products for perimeter defense, secure access, and privileged access management could see disruptions or breaches if attackers exploit this vulnerability. The impact is particularly significant for sectors with stringent regulatory requirements such as finance, healthcare, and critical infrastructure, where unauthorized access could lead to data breaches, service outages, or compliance violations. Since REST API logging is not enabled by default, the risk is somewhat mitigated, but organizations that have enabled this feature for auditing or troubleshooting purposes are at heightened risk. The absence of known exploits in the wild provides a window for remediation, but the potential for privilege escalation makes timely patching or mitigation critical to prevent lateral movement and deeper network compromise.
Mitigation Recommendations
European organizations should first audit their Fortinet deployments to determine if REST API logging is enabled on affected products and versions. If logging is enabled, consider disabling it unless absolutely necessary or restrict access to logs strictly to trusted administrators. Apply the latest patches or updates from Fortinet as soon as they become available for the affected products and versions. Implement strict role-based access controls (RBAC) to minimize the number of administrators with read-only access and monitor administrative activities closely. Employ network segmentation and monitoring to detect unusual access patterns to administrative logs or API tokens. Use multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. Additionally, review and harden logging configurations to avoid logging sensitive information where possible. Conduct regular security assessments and penetration tests focusing on administrative interfaces and logging mechanisms to identify and remediate similar issues proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- fortinet
- Date Reserved
- 2024-09-27T16:19:24.136Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69385e4c74ebaa3baba14001
Added to database: 12/9/2025, 5:37:16 PM
Last enriched: 1/14/2026, 2:47:32 PM
Last updated: 2/7/2026, 9:55:46 AM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.