Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48887: Escalation of privilege in Fortinet FortiSwitch

0
Critical
VulnerabilityCVE-2024-48887cvecve-2024-48887
Published: Tue Apr 08 2025 (04/08/2025, 16:52:02 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiSwitch

Description

A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a specially crafted request

AI-Powered Analysis

AILast updated: 02/26/2026, 19:43:49 UTC

Technical Analysis

CVE-2024-48887 is a critical escalation of privilege vulnerability identified in Fortinet FortiSwitch devices, specifically affecting the GUI password change functionality. The vulnerability allows a remote attacker with no authentication to send a specially crafted request to the FortiSwitch management interface, resulting in an unauthorized change of the administrator password. This bypasses normal verification controls, effectively granting full administrative access to the attacker. The affected FortiSwitch firmware versions include 6.4.0, 7.0.0, 7.2.0, 7.4.0, and 7.6.0, indicating a broad impact across multiple recent releases. The vulnerability is remotely exploitable over the network without any user interaction, making it highly accessible to attackers. The CVSS v3.1 base score of 9.3 reflects the critical nature of this flaw, with high impact on confidentiality, integrity, and availability. Although no public exploits or active exploitation have been reported yet, the vulnerability's characteristics suggest it could be weaponized quickly by threat actors. FortiSwitch devices are commonly deployed in enterprise and service provider networks for switching and segmentation, meaning compromise could lead to significant network control, data interception, and further lateral attacks. The lack of authentication requirement and the ability to change admin credentials remotely make this vulnerability particularly dangerous. Fortinet has not yet published patches or mitigation details, so organizations must implement interim controls to reduce exposure.

Potential Impact

The impact of CVE-2024-48887 is severe for organizations globally that rely on Fortinet FortiSwitch devices for network infrastructure. Successful exploitation grants attackers full administrative control over the switch, enabling them to alter configurations, intercept or redirect network traffic, disable security controls, and potentially pivot to other internal systems. This can lead to widespread network disruption, data breaches, and loss of integrity and availability of critical network services. The vulnerability's remote and unauthenticated nature means attackers can exploit it without prior access or credentials, increasing the likelihood of compromise. Enterprises, data centers, and service providers using FortiSwitch devices are at risk of targeted attacks or opportunistic exploitation. The ability to change admin passwords undermines trust in device management and complicates incident response. Additionally, attackers could maintain persistent access by locking out legitimate administrators. The lack of known exploits currently reduces immediate risk but does not diminish the urgency for mitigation given the high severity and ease of exploitation.

Mitigation Recommendations

Until official patches are released by Fortinet, organizations should take the following specific mitigation steps: 1) Restrict access to FortiSwitch management interfaces by implementing network segmentation and firewall rules to allow only trusted IP addresses or management stations. 2) Disable remote GUI access if not strictly necessary, or restrict it to secure VPN connections. 3) Monitor logs and network traffic for unusual password change attempts or unauthorized access patterns to the FortiSwitch GUI. 4) Employ multi-factor authentication (MFA) on management interfaces where supported to add an additional layer of security. 5) Regularly back up device configurations to enable rapid recovery if compromised. 6) Stay informed on Fortinet advisories and apply patches immediately once available. 7) Conduct internal audits of FortiSwitch devices to verify current firmware versions and prioritize upgrades. 8) Consider deploying network intrusion detection systems (IDS) to detect anomalous requests targeting FortiSwitch management endpoints. These targeted mitigations go beyond generic advice by focusing on reducing attack surface and improving detection specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2024-10-09T09:03:09.960Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a1b985912abc71d0a0de

Added to database: 2/26/2026, 7:40:41 PM

Last enriched: 2/26/2026, 7:43:49 PM

Last updated: 2/26/2026, 11:18:30 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses