Skip to main content

CVE-2025-24474: Execute unauthorized code or commands in Fortinet FortiManager

Low
VulnerabilityCVE-2025-24474cvecve-2025-24474
Published: Tue Jul 08 2025 (07/08/2025, 14:41:34 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiManager

Description

An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiManager 7.6.0 through 7.6.1, 7.4.0 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions; FortiManager Cloud 7.4.1 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions; FortiAnalyzer 7.6.0 through 7.6.1, 7.4.0 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions; and FortiAnalyzer Cloud 7.4.1 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an authenticated attacker with high privilege to extract database information via crafted requests.

AI-Powered Analysis

AILast updated: 07/08/2025, 15:09:54 UTC

Technical Analysis

CVE-2025-24474 is a SQL Injection vulnerability affecting multiple versions of Fortinet's FortiManager and FortiAnalyzer products, including their cloud variants. The affected versions span FortiManager 6.4.0 through 7.6.1, FortiAnalyzer 6.4.0 through 7.6.1, and corresponding cloud versions. This vulnerability arises from improper neutralization of special elements in SQL commands, allowing an authenticated attacker with high privileges to craft malicious requests that can extract sensitive database information. The vulnerability does not allow code execution or modification of data but can lead to unauthorized disclosure of information stored in the backend database. The CVSS v3.1 base score is 2.6, indicating a low severity primarily due to the requirement for high privilege authentication, no user interaction, and limited impact on confidentiality (only partial data disclosure), with no impact on integrity or availability. Exploitation requires network access and valid credentials with elevated privileges, limiting the attack surface. No known exploits are currently reported in the wild, and no patches or mitigations have been explicitly linked in the provided data. The vulnerability affects core management and analytics products used to administer Fortinet security infrastructure, which are critical in enterprise environments for centralized security policy management and log analysis.

Potential Impact

For European organizations, the impact of CVE-2025-24474 is primarily related to potential unauthorized disclosure of sensitive configuration or operational data stored within FortiManager and FortiAnalyzer databases. While the vulnerability does not allow direct system compromise or disruption, the leakage of database information could aid attackers in reconnaissance, facilitating further targeted attacks or privilege escalation. Given that FortiManager and FortiAnalyzer are widely deployed in enterprise and service provider networks across Europe to manage Fortinet security devices, exploitation could undermine the confidentiality of security policies, network topology, or user data. This could be particularly impactful for sectors with stringent data protection requirements such as finance, healthcare, and critical infrastructure. However, the requirement for high privilege authentication significantly reduces the risk of external attackers exploiting this vulnerability without prior access. Insider threats or attackers who have already compromised administrative credentials pose the greatest risk. The absence of known exploits in the wild and the low CVSS score suggest a limited immediate threat, but organizations should remain vigilant given the strategic importance of these management platforms.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately review and restrict administrative access to FortiManager and FortiAnalyzer to only trusted personnel, enforcing the principle of least privilege. 2) Monitor and audit all high privilege account activities for unusual or unauthorized database queries or access patterns that could indicate exploitation attempts. 3) Apply strict network segmentation and firewall rules to limit access to FortiManager and FortiAnalyzer interfaces to trusted management networks and VPNs, reducing exposure to potential attackers. 4) Regularly update Fortinet products to the latest available versions as soon as Fortinet releases patches addressing this vulnerability, even though no patch links are currently provided. 5) Employ multi-factor authentication (MFA) for all administrative accounts to mitigate risks from credential compromise. 6) Conduct internal penetration testing and vulnerability assessments focusing on SQL injection vectors within these management platforms to proactively identify and remediate weaknesses. 7) Maintain up-to-date backups of configuration and database information to enable recovery in case of compromise. These targeted actions go beyond generic advice by focusing on access control, monitoring, network isolation, and proactive testing specific to the Fortinet management environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-01-21T20:48:07.886Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d31256f40f0eb72f633c7

Added to database: 7/8/2025, 2:54:29 PM

Last enriched: 7/8/2025, 3:09:54 PM

Last updated: 7/8/2025, 3:09:54 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats