Skip to main content

CVE-2025-24474: Execute unauthorized code or commands in Fortinet FortiManager

Low
VulnerabilityCVE-2025-24474cvecve-2025-24474
Published: Tue Jul 08 2025 (07/08/2025, 14:41:34 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiManager

Description

An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiManager 7.6.0 through 7.6.1, 7.4.0 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions; FortiManager Cloud 7.4.1 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions; FortiAnalyzer 7.6.0 through 7.6.1, 7.4.0 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions; and FortiAnalyzer Cloud 7.4.1 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an authenticated attacker with high privilege to extract database information via crafted requests.

AI-Powered Analysis

AILast updated: 07/15/2025, 21:57:39 UTC

Technical Analysis

CVE-2025-24474 is a SQL Injection vulnerability affecting multiple versions of Fortinet's FortiManager and FortiAnalyzer products, including their cloud variants. The affected versions span FortiManager 6.4.0 through 7.6.1, FortiManager Cloud 6.4.0 through 7.4.6, FortiAnalyzer 6.4.0 through 7.6.1, and FortiAnalyzer Cloud 6.4.0 through 7.4.6. This vulnerability arises from improper neutralization of special elements in SQL commands, allowing an attacker with high privileges and authenticated access to craft malicious requests that can extract sensitive database information. The vulnerability does not allow for code execution or modification of data integrity or availability but can lead to unauthorized disclosure of information stored in the backend database. The CVSS v3.1 base score is 2.6, indicating a low severity primarily because exploitation requires high privilege authentication and no user interaction is needed. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires privileges (PR:H). The vulnerability scope is unchanged (S:U), and the impact is limited to confidentiality (C:L) without affecting integrity or availability. No known exploits are reported in the wild as of the publication date. FortiManager and FortiAnalyzer are critical network management and analytics tools used to centrally manage Fortinet security appliances and analyze security events, making the confidentiality of their databases important for organizational security posture.

Potential Impact

For European organizations, the impact of CVE-2025-24474 is primarily the potential unauthorized disclosure of sensitive configuration and operational data stored within FortiManager and FortiAnalyzer databases. This could include network topology, security policies, logs, and other sensitive information that could aid an attacker in further targeting the organization or understanding its security defenses. While the vulnerability does not allow direct code execution or service disruption, the exposure of confidential data could lead to secondary attacks or compliance violations under regulations such as GDPR. Organizations relying heavily on Fortinet centralized management solutions may face increased risk if attackers gain high privilege credentials, potentially through phishing or insider threats. The low CVSS score reflects the limited direct impact, but the strategic importance of the data managed by these products elevates the risk profile for critical infrastructure, government, financial, and large enterprise sectors prevalent in Europe.

Mitigation Recommendations

Mitigation should focus on minimizing the risk of privilege escalation and unauthorized access to FortiManager and FortiAnalyzer systems. Specific recommendations include: 1) Apply vendor patches immediately once available to address the SQL injection vulnerability directly. 2) Enforce strict access controls and role-based access management to limit high privilege accounts only to essential personnel. 3) Implement multi-factor authentication (MFA) for all administrative access to Fortinet management consoles. 4) Monitor and audit access logs for unusual or unauthorized activities, particularly focusing on high privilege accounts. 5) Network segmentation should isolate management consoles from general user networks and restrict access to trusted IP addresses only. 6) Conduct regular security assessments and penetration testing on Fortinet management infrastructure to detect potential exploitation attempts. 7) Educate administrators on phishing and credential security to reduce the risk of credential compromise. 8) If possible, enable database encryption and secure communication channels to protect data confidentiality in transit and at rest.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2025-01-21T20:48:07.886Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d31256f40f0eb72f633c7

Added to database: 7/8/2025, 2:54:29 PM

Last enriched: 7/15/2025, 9:57:39 PM

Last updated: 8/18/2025, 10:05:37 AM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats