Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-50566: Execute unauthorized code or commands in Fortinet FortiManager

0
High
VulnerabilityCVE-2024-50566cvecve-2024-50566
Published: Tue Jan 14 2025 (01/14/2025, 14:08:35 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiManager

Description

A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiManager Cloud 7.6.0 through 7.6.1, FortiManager Cloud 7.4.0 through 7.4.4, FortiManager Cloud 7.2.2 through 7.2.7, FortiManager 7.6.0 through 7.6.1, FortiManager 7.4.0 through 7.4.5, FortiManager 7.2.1 through 7.2.8 may allow an authenticated remote attacker to execute unauthorized code via FGFM crafted requests.

AI-Powered Analysis

AILast updated: 01/14/2026, 13:17:05 UTC

Technical Analysis

CVE-2024-50566 is an OS command injection vulnerability identified in Fortinet FortiManager and FortiManager Cloud versions 7.2.1 through 7.2.8, 7.4.0 through 7.4.5, and 7.6.0 through 7.6.1. The vulnerability arises from improper neutralization of special elements in operating system commands processed by the FortiManager's FGFM (Fortinet Generic Fabric Manager) protocol. An attacker with authenticated access and high privileges can craft malicious FGFM requests that inject arbitrary OS commands, leading to unauthorized code execution on the underlying system. This can compromise the confidentiality, integrity, and availability of the FortiManager device and potentially the managed network infrastructure. The vulnerability is remotely exploitable over the network without requiring user interaction beyond authentication. FortiManager is a centralized management platform for Fortinet security devices, widely deployed in enterprise and service provider environments to manage firewalls, VPNs, and other security appliances. Exploitation could allow attackers to manipulate device configurations, disrupt network security policies, or pivot into internal networks. The CVSS 3.1 base score is 7.2, reflecting high impact and relatively low attack complexity, though requiring authenticated access. No public exploits or active exploitation have been reported yet, but the vulnerability is critical due to the privileged access it grants and the central role of FortiManager in network security management.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Fortinet FortiManager in enterprise and service provider networks across Europe. Successful exploitation could lead to full compromise of network management infrastructure, allowing attackers to alter firewall rules, disable security controls, or deploy malicious configurations. This could result in data breaches, service disruptions, and lateral movement within corporate networks. Critical sectors such as finance, telecommunications, government, and energy, which rely heavily on Fortinet products for network security, are particularly at risk. The centralized nature of FortiManager means a single compromised device could impact multiple managed devices, amplifying the potential damage. Additionally, the requirement for authenticated access means insider threats or compromised credentials could be leveraged to exploit this vulnerability. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for mitigation given the high impact potential.

Mitigation Recommendations

European organizations should immediately identify all FortiManager and FortiManager Cloud instances running affected versions (7.2.1 through 7.2.8, 7.4.0 through 7.4.5, and 7.6.0 through 7.6.1). They should prioritize upgrading to the latest patched versions provided by Fortinet as soon as they become available. Until patches are applied, organizations should restrict access to FortiManager management interfaces to trusted networks and enforce strict authentication controls, including multi-factor authentication (MFA) for all administrative accounts. Network segmentation should be employed to isolate FortiManager devices from general user networks. Monitoring and logging of FGFM protocol traffic should be enhanced to detect anomalous or suspicious requests indicative of exploitation attempts. Regular audits of user accounts and privileges on FortiManager should be conducted to minimize the risk of credential misuse. Additionally, organizations should review and harden firewall rules controlling access to FortiManager management ports. Incident response plans should be updated to include detection and containment strategies for potential exploitation of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2024-10-24T11:52:14.401Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696793f38330e067163e9f2a

Added to database: 1/14/2026, 1:02:43 PM

Last enriched: 1/14/2026, 1:17:05 PM

Last updated: 1/14/2026, 3:03:46 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats