Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24472: Execute unauthorized code or commands in Fortinet FortiProxy

0
High
VulnerabilityCVE-2025-24472cvecve-2025-24472
Published: Tue Feb 11 2025 (02/11/2025, 16:50:42 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiProxy

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.2.0 through 7.2.12, 7.0.0 through 7.0.19 may allow a remote unauthenticated attacker with prior knowledge of upstream and downstream devices serial numbers to gain super-admin privileges on the downstream device, if the Security Fabric is enabled, via crafted CSF proxy requests.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 12:36:56 UTC

Technical Analysis

CVE-2025-24472 is an authentication bypass vulnerability classified under CWE-288, affecting Fortinet FortiProxy versions 7.2.0 through 7.2.12 and FortiOS versions 7.0.0 through 7.0.19. The flaw arises when the Security Fabric feature is enabled, which integrates multiple Fortinet devices for centralized management and security enforcement. An attacker with prior knowledge of the serial numbers of both upstream and downstream devices can craft specific CSF proxy requests that exploit an alternate path or channel to bypass authentication mechanisms. This bypass grants the attacker super-admin privileges on the downstream device remotely and without any user interaction or prior authentication. The vulnerability impacts core security properties: confidentiality (by exposing sensitive device controls), integrity (by allowing unauthorized configuration changes), and availability (potentially disrupting device operations). The CVSS v3.1 score of 8.1 reflects the network attack vector, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the complexity of the attack is elevated by the requirement to know device serial numbers and the need for the Security Fabric to be enabled, which may limit exploitation scope. However, given Fortinet’s widespread use in enterprise and critical infrastructure environments, the risk remains significant. The vulnerability underscores the importance of securing device serial number information and carefully managing Security Fabric configurations.

Potential Impact

Successful exploitation of CVE-2025-24472 allows an unauthenticated remote attacker to gain super-admin privileges on downstream Fortinet devices within a Security Fabric environment. This can lead to complete compromise of affected devices, enabling attackers to execute arbitrary code or commands, alter security policies, intercept or redirect traffic, and disrupt network availability. The breach of confidentiality and integrity can facilitate further lateral movement within an organization’s network, potentially exposing sensitive data and critical systems. Organizations relying on Fortinet FortiProxy and FortiOS in Security Fabric mode—especially in sectors like finance, government, healthcare, and telecommunications—face heightened risk of operational disruption and data breaches. The requirement for knowledge of device serial numbers somewhat limits the attack surface but does not eliminate the threat, as such information may be obtainable through social engineering, insider threats, or reconnaissance. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation. Overall, the vulnerability poses a significant threat to network security and operational continuity for organizations globally using affected Fortinet products.

Mitigation Recommendations

1. Apply vendor-provided patches or updates immediately once available to address CVE-2025-24472. 2. If patches are not yet available, disable the Security Fabric feature temporarily or restrict its use to trusted network segments. 3. Limit network exposure of Fortinet management interfaces and CSF proxy endpoints by implementing strict access controls, such as IP whitelisting and VPN-only access. 4. Protect device serial number information rigorously to prevent leakage through documentation, social engineering, or network reconnaissance. 5. Monitor network traffic for unusual or crafted CSF proxy requests that could indicate exploitation attempts. 6. Employ network segmentation to isolate Fortinet devices and reduce lateral movement opportunities. 7. Conduct regular security audits and penetration testing focused on Fortinet Security Fabric deployments. 8. Educate staff on the sensitivity of device identifiers and the risks associated with their disclosure. 9. Maintain up-to-date incident response plans tailored to Fortinet device compromise scenarios. 10. Collaborate with Fortinet support and threat intelligence communities to stay informed about emerging exploits and mitigation strategies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-01-21T20:48:07.886Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68881727ad5a09ad0088bc71

Added to database: 7/29/2025, 12:34:47 AM

Last enriched: 2/27/2026, 12:36:56 PM

Last updated: 3/24/2026, 3:58:57 AM

Views: 177

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses