Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48884: Escalation of privilege in Fortinet FortiProxy

0
High
VulnerabilityCVE-2024-48884cvecve-2024-48884
Published: Tue Jan 14 2025 (01/14/2025, 14:09:26 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiProxy

Description

A improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in Fortinet FortiManager 7.6.0 through 7.6.1, FortiManager 7.4.1 through 7.4.3, FortiManager Cloud 7.4.1 through 7.4.3, FortiOS 7.6.0, FortiOS 7.4.0 through 7.4.4, FortiOS 7.2.0 through 7.2.9, FortiOS 7.0.0 through 7.0.15, FortiOS 6.4.0 through 6.4.15, FortiProxy 7.4.0 through 7.4.5, FortiProxy 7.2.0 through 7.2.11, FortiProxy 7.0.0 through 7.0.18, FortiProxy 2.0 all versions, FortiProxy 1.2 all versions, FortiProxy 1.1 all versions, FortiProxy 1.0 all versions may allow a remote authenticated attacker with access to the security fabric interface and port to write arbitrary files or a remote unauthenticated attacker to delete an arbitrary folder

AI-Powered Analysis

AILast updated: 01/14/2026, 13:17:21 UTC

Technical Analysis

CVE-2024-48884 is a path traversal vulnerability identified in Fortinet's FortiProxy, FortiManager, and FortiOS products across multiple versions, including FortiProxy 1.0 through 7.4.5, FortiManager 7.4.1 through 7.6.1, and FortiOS 6.4.0 through 7.6.0. The flaw stems from improper validation and limitation of pathnames, allowing attackers to escape restricted directories. This vulnerability enables two main attack vectors: a remote unauthenticated attacker can delete arbitrary folders on the affected system, potentially causing denial of service or disruption; and a remote authenticated attacker with access to the security fabric interface and port can write arbitrary files, which could be leveraged for further compromise or persistence. The vulnerability does not require user interaction and can be exploited remotely over the network, increasing its risk profile. The CVSS 3.1 base score of 7.1 reflects a high severity, primarily due to the impact on availability (A:H) and the ease of exploitation (AV:N/AC:L/PR:N/UI:N). Although no known exploits have been reported in the wild yet, the broad range of affected versions and products, combined with the critical role these devices play in network security, make this a significant threat. Fortinet devices are widely deployed in enterprise and service provider environments, often forming the backbone of security infrastructure, which amplifies the potential impact of successful exploitation.

Potential Impact

For European organizations, the impact of CVE-2024-48884 can be substantial. Fortinet FortiProxy, FortiManager, and FortiOS devices are commonly used to secure enterprise networks, manage security policies, and provide proxy services. Exploitation could lead to deletion of critical system folders or unauthorized file writes, resulting in service disruption, loss of availability, and potential compromise of network security controls. This could affect business continuity, especially in sectors reliant on continuous network availability such as finance, healthcare, and critical infrastructure. Additionally, unauthorized file writes by authenticated attackers could be used to implant malicious code or backdoors, escalating the risk of further attacks. The vulnerability’s ability to be exploited remotely without user interaction increases the risk of widespread attacks if threat actors develop exploits. Given the strategic importance of Fortinet devices in European networks, successful exploitation could have cascading effects on data protection and regulatory compliance under GDPR and other frameworks.

Mitigation Recommendations

European organizations should immediately assess their Fortinet device inventory to identify affected versions of FortiProxy, FortiManager, and FortiOS. Although no official patches are linked in the provided data, organizations should monitor Fortinet advisories closely and apply vendor patches as soon as they become available. In the interim, restrict network access to management and security fabric interfaces using network segmentation, firewall rules, and VPNs to limit exposure to trusted administrators only. Implement strict access controls and multi-factor authentication for any authenticated interfaces to reduce the risk of unauthorized file writes. Regularly audit device configurations and logs for suspicious activity indicative of exploitation attempts. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect path traversal attempts targeting Fortinet devices. Additionally, maintain up-to-date backups of device configurations and critical data to enable rapid recovery in case of deletion or disruption. Finally, conduct security awareness training for administrators on the risks and signs of exploitation related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2024-10-09T09:03:09.960Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696793f38330e067163e9f24

Added to database: 1/14/2026, 1:02:43 PM

Last enriched: 1/14/2026, 1:17:21 PM

Last updated: 1/14/2026, 3:34:47 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats