Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24017: Improper access control in Fortinet FortiWeb

0
High
VulnerabilityCVE-2026-24017cvecve-2026-24017
Published: Tue Mar 10 2026 (03/10/2026, 16:44:19 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiWeb

Description

An Improper Control of Interaction Frequency vulnerability [CWE-799] vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.2, FortiWeb 7.6.0 through 7.6.5, FortiWeb 7.4.0 through 7.4.10, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow a remote unauthenticated attacker to bypass the authentication rate-limit via crafted requests. The success of the attack depends on the attacker's resources and the password target complexity.

AI-Powered Analysis

AILast updated: 03/10/2026, 17:49:57 UTC

Technical Analysis

CVE-2026-24017 is an improper control of interaction frequency vulnerability (CWE-799) identified in multiple versions of Fortinet's FortiWeb web application firewall (WAF) product, specifically versions 7.0.0 through 8.0.2. The vulnerability allows a remote attacker with no authentication privileges to bypass the authentication rate-limiting mechanism by sending specially crafted requests. Rate-limiting is a critical security control designed to prevent automated brute-force attacks by limiting the number of authentication attempts within a given time frame. By circumventing this control, an attacker can perform rapid, repeated authentication attempts, increasing the likelihood of successfully guessing valid credentials, especially if passwords are weak or predictable. The vulnerability affects all supported FortiWeb versions listed and is exploitable over the network without user interaction. The CVSS v3.1 base score of 7.3 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation could lead to unauthorized access, data compromise, and potential service disruption. Although no public exploits have been reported yet, the vulnerability's nature makes it a significant risk for organizations relying on FortiWeb for web application security. The attack's success depends on the attacker's resources and the complexity of targeted passwords, meaning well-secured environments may be less vulnerable but still at risk. Fortinet has not yet published patches or mitigation details, so organizations must monitor vendor advisories closely.

Potential Impact

The primary impact of CVE-2026-24017 is the increased risk of successful brute-force attacks against FortiWeb authentication mechanisms due to the bypass of rate-limiting controls. This can lead to unauthorized access to the FortiWeb management interface or protected applications, potentially exposing sensitive data or enabling further network compromise. Confidentiality is at risk as attackers may gain access to sensitive configuration or monitoring data. Integrity could be compromised if attackers alter security policies or configurations. Availability may be affected if attackers disrupt services or lock out legitimate users. Organizations relying on FortiWeb for web application firewalling and security enforcement may face increased exposure to credential-based attacks, undermining their overall security posture. The vulnerability's network-exploitable and unauthenticated nature broadens the attack surface, making it attractive for attackers. While no known exploits are currently in the wild, the high CVSS score and ease of exploitation without authentication indicate a significant threat, especially for organizations with weak password policies or insufficient monitoring.

Mitigation Recommendations

1. Monitor Fortinet advisories closely and apply security patches or updates as soon as they become available for affected FortiWeb versions. 2. Implement strong password policies enforcing complexity, length, and regular rotation to reduce the risk of successful brute-force attacks. 3. Employ additional authentication mechanisms such as multi-factor authentication (MFA) for FortiWeb management interfaces to add a layer of defense beyond password protection. 4. Use network-level protections like IP reputation filtering, geo-blocking, or firewall rules to restrict access to FortiWeb management interfaces to trusted IP addresses only. 5. Enable and monitor detailed logging and alerting for authentication attempts to detect abnormal or repeated login failures indicative of brute-force activity. 6. Consider deploying web application firewalls or intrusion prevention systems upstream to detect and block suspicious authentication request patterns. 7. Conduct regular security assessments and penetration tests to identify and remediate weaknesses in authentication controls. 8. Educate administrators and security teams about this vulnerability and the importance of rapid response and monitoring for exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2026-01-20T11:13:10.548Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b05634ea502d3aa87d6bd0

Added to database: 3/10/2026, 5:34:44 PM

Last enriched: 3/10/2026, 5:49:57 PM

Last updated: 3/14/2026, 12:50:21 AM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses