Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48885: Escalation of privilege in Fortinet FortiRecorder

0
Medium
VulnerabilityCVE-2024-48885cvecve-2024-48885
Published: Thu Jan 16 2025 (01/16/2025, 09:01:52 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiRecorder

Description

A improper limitation of a pathname to a restricted directory ('path traversal') vulnerability in Fortinet FortiRecorder 7.2.0 through 7.2.1, FortiRecorder 7.0.0 through 7.0.4, FortiVoice 7.0.0 through 7.0.4, FortiVoice 6.4.0 through 6.4.9, FortiVoice 6.0 all versions, FortiWeb 7.6.0, FortiWeb 7.4.0 through 7.4.4, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions, FortiWeb 6.4 all versions allows attacker to escalate privilege via specially crafted packets.

AI-Powered Analysis

AILast updated: 01/14/2026, 13:17:36 UTC

Technical Analysis

CVE-2024-48885 is a path traversal vulnerability identified in Fortinet's FortiRecorder, FortiVoice, and FortiWeb products across multiple versions (FortiRecorder 7.2.0-7.2.1, 7.0.0-7.0.4; FortiVoice 6.0 all versions, 6.4.0-6.4.9, 7.0.0-7.0.4; FortiWeb 6.4 all versions, 7.0 all versions, 7.2 all versions, 7.4.0-7.4.4, and 7.6.0). The vulnerability arises from improper limitation of pathnames to restricted directories, allowing an attacker to craft packets that traverse directories and escalate privileges on the affected system. This flaw enables an attacker with network access and low privileges to potentially disrupt system availability by accessing or manipulating restricted files or directories. The vulnerability does not impact confidentiality or integrity directly but can cause denial of service or system instability. Exploitation does not require user interaction but does require some level of authentication or access to the network interface. The CVSS v3.1 score of 5.2 reflects a medium severity with network attack vector, high attack complexity, and low privileges required. No public exploits or active exploitation in the wild have been reported as of the publication date. Fortinet has not yet released official patches or mitigation instructions, so organizations must monitor vendor advisories closely. The vulnerability affects critical Fortinet security and communication products widely deployed in enterprise and service provider environments.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to availability of critical network and communication infrastructure. Fortinet products like FortiRecorder, FortiVoice, and FortiWeb are commonly used in enterprise security, voice communications, and web application firewalling. Exploitation could lead to denial of service conditions or unauthorized access to restricted system areas, potentially disrupting business operations. Organizations in sectors such as telecommunications, finance, government, and critical infrastructure that rely on these Fortinet products could experience operational interruptions. Although confidentiality and integrity impacts are not evident, availability degradation can have cascading effects on service delivery and compliance with regulatory requirements such as GDPR. The lack of known exploits reduces immediate risk, but the presence of a publicly disclosed vulnerability necessitates proactive mitigation to prevent future attacks. The medium severity rating suggests that while the threat is not critical, it should not be ignored given the strategic importance of affected systems.

Mitigation Recommendations

1. Immediate network segmentation: Isolate Fortinet devices from untrusted networks to limit exposure to potential attackers. 2. Restrict access: Enforce strict access controls and limit administrative network access to trusted personnel and IP ranges. 3. Monitor network traffic: Deploy intrusion detection/prevention systems to detect anomalous packets targeting Fortinet devices. 4. Apply vendor patches promptly: Monitor Fortinet advisories and apply security updates as soon as they become available. 5. Harden configurations: Disable unnecessary services and features on Fortinet products to reduce attack surface. 6. Conduct regular vulnerability assessments and penetration testing focusing on Fortinet infrastructure. 7. Implement robust logging and alerting to detect exploitation attempts early. 8. Educate network administrators about this specific vulnerability and signs of exploitation. 9. Consider compensating controls such as Web Application Firewalls or endpoint protections to mitigate impact. 10. Maintain an incident response plan tailored to Fortinet product compromise scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2024-10-09T09:03:09.960Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696793f38330e067163e9f27

Added to database: 1/14/2026, 1:02:43 PM

Last enriched: 1/14/2026, 1:17:36 PM

Last updated: 1/14/2026, 3:34:41 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats