Skip to main content

CVE-2025-24472: Execute unauthorized code or commands in Fortinet FortiProxy

High
VulnerabilityCVE-2025-24472cvecve-2025-24472
Published: Tue Feb 11 2025 (02/11/2025, 16:50:42 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiProxy

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.2.0 through 7.2.12, 7.0.0 through 7.0.19 may allow a remote unauthenticated attacker with prior knowledge of upstream and downstream devices serial numbers to gain super-admin privileges on the downstream device, if the Security Fabric is enabled, via crafted CSF proxy requests.

AI-Powered Analysis

AILast updated: 08/13/2025, 00:59:50 UTC

Technical Analysis

CVE-2025-24472 is a critical authentication bypass vulnerability affecting Fortinet FortiProxy and FortiOS products, specifically versions 7.0.0 through 7.0.16 for FortiOS and 7.2.0 through 7.2.12 and 7.0.0 through 7.0.19 for FortiProxy. The vulnerability arises from an alternate path or channel that allows an unauthenticated remote attacker to bypass authentication controls if they possess prior knowledge of the serial numbers of both upstream and downstream devices within a Security Fabric deployment. By crafting specific CSF (Central Security Fabric) proxy requests, the attacker can escalate privileges to super-admin on the downstream device. This effectively grants full control over the device, enabling execution of unauthorized code or commands, which can compromise confidentiality, integrity, and availability of the affected systems. The vulnerability has a CVSS v3.1 base score of 8.1, indicating high severity, with attack vector being network-based, requiring no privileges or user interaction, but with high attack complexity due to the need for serial number knowledge. The scope is unchanged, but the impact on confidentiality, integrity, and availability is high. No known exploits are currently reported in the wild, but the potential for exploitation is significant given the critical access gained. The vulnerability affects devices configured with Security Fabric enabled, which is commonly used in enterprise environments to integrate and manage multiple Fortinet devices. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring.

Potential Impact

For European organizations, the impact of CVE-2025-24472 can be severe, especially for enterprises and service providers relying on Fortinet FortiProxy and FortiOS devices for network security and traffic management. Successful exploitation could lead to full compromise of downstream devices, enabling attackers to execute arbitrary commands, manipulate traffic, exfiltrate sensitive data, or disrupt network operations. This could affect critical infrastructure, financial institutions, healthcare providers, and government agencies that depend on Fortinet's Security Fabric for integrated security management. The breach of confidentiality and integrity could result in data leaks, regulatory non-compliance (e.g., GDPR violations), and operational downtime. Additionally, the ability to execute unauthorized code remotely without authentication increases the risk of widespread lateral movement within networks. Given the high adoption of Fortinet products in Europe, the threat could have cascading effects on supply chains and critical services.

Mitigation Recommendations

Organizations should immediately audit their Fortinet FortiProxy and FortiOS deployments to identify affected versions and confirm whether Security Fabric is enabled. Until official patches are released, it is critical to implement network-level controls to restrict access to management interfaces and CSF proxy endpoints, limiting them to trusted internal networks and known IP addresses. Monitoring and logging of CSF proxy requests should be enhanced to detect anomalous or crafted requests indicative of exploitation attempts. Fortinet administrators should rotate and protect device serial numbers and related information to reduce the risk of attackers obtaining the required knowledge. Employing network segmentation to isolate downstream devices can limit the impact of a successful attack. Additionally, organizations should stay informed about Fortinet’s security advisories for patch releases and apply updates promptly once available. Incident response plans should be updated to include detection and remediation steps for this vulnerability. Where feasible, consider temporarily disabling Security Fabric features that expose CSF proxy interfaces until patches are applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-01-21T20:48:07.886Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68881727ad5a09ad0088bc71

Added to database: 7/29/2025, 12:34:47 AM

Last enriched: 8/13/2025, 12:59:50 AM

Last updated: 9/10/2025, 5:48:00 PM

Views: 35

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats