Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24017: Improper access control in Fortinet FortiWeb

0
High
VulnerabilityCVE-2026-24017cvecve-2026-24017
Published: Tue Mar 10 2026 (03/10/2026, 16:44:19 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiWeb

Description

CVE-2026-24017 is a high-severity vulnerability in Fortinet FortiWeb versions 7. 0. 0 through 8. 0. 2 that allows remote unauthenticated attackers to bypass authentication rate-limiting via crafted requests. This improper control of interaction frequency flaw enables attackers to perform brute-force or credential-stuffing attacks more effectively by circumventing protections designed to limit repeated login attempts. Exploitation does not require user interaction or prior authentication but depends on attacker resources and password complexity. The vulnerability impacts confidentiality, integrity, and availability of affected systems. No known exploits are currently reported in the wild. Organizations using FortiWeb as a web application firewall should prioritize patching or mitigating this issue to prevent potential account compromise or service disruption.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/17/2026, 19:13:12 UTC

Technical Analysis

CVE-2026-24017 is an improper access control vulnerability categorized under CWE-799, affecting multiple versions of Fortinet's FortiWeb web application firewall (WAF) product, specifically versions 7.0.0 through 8.0.2. The flaw arises from insufficient enforcement of authentication rate-limiting controls, allowing remote unauthenticated attackers to bypass these limits by sending specially crafted requests. Rate-limiting is a critical security control that restricts the number of authentication attempts within a given timeframe to prevent brute-force attacks. By circumventing this control, attackers can attempt a large number of password guesses without being blocked or throttled. The success of such attacks depends on the attacker's computational resources and the complexity of targeted passwords. The vulnerability affects confidentiality by potentially exposing valid credentials, integrity by enabling unauthorized access, and availability by facilitating denial-of-service conditions through excessive authentication attempts. The CVSS v3.1 base score is 7.3 (high), reflecting network attack vector, high impact on confidentiality, integrity, and availability, no privileges required, no user interaction, and a proof-of-concept exploit level. Although no known exploits are reported in the wild, the vulnerability's nature makes it a significant risk for organizations relying on FortiWeb for web application security. Fortinet has not yet provided patch links, indicating that remediation may still be pending or in progress.

Potential Impact

This vulnerability poses a significant risk to organizations worldwide that deploy Fortinet FortiWeb appliances for web application security. By bypassing authentication rate-limiting, attackers can launch large-scale brute-force or credential-stuffing attacks, increasing the likelihood of account compromise. Successful exploitation can lead to unauthorized access to sensitive systems, data breaches, and potential lateral movement within networks. The integrity of protected web applications can be undermined, and availability may be affected if attackers generate excessive authentication attempts, potentially leading to denial-of-service conditions. Given FortiWeb's role in protecting critical web infrastructure, exploitation could impact sectors such as finance, healthcare, government, and e-commerce. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are released or if organizations delay remediation.

Mitigation Recommendations

Organizations should immediately inventory their FortiWeb deployments to identify affected versions (7.0.0 through 8.0.2). They should monitor Fortinet advisories closely for official patches or updates addressing CVE-2026-24017 and apply them promptly once available. In the interim, administrators can implement compensating controls such as deploying external rate-limiting mechanisms at the network perimeter or using web application firewalls with stricter authentication attempt thresholds. Enforcing multi-factor authentication (MFA) on FortiWeb management interfaces and any integrated authentication systems can reduce the risk of credential compromise. Logging and monitoring authentication attempts for unusual patterns can help detect exploitation attempts early. Network segmentation and limiting administrative access to FortiWeb appliances reduce exposure. Additionally, organizations should educate security teams about this vulnerability to ensure rapid response and incident handling if exploitation attempts are detected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2026-01-20T11:13:10.548Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b05634ea502d3aa87d6bd0

Added to database: 3/10/2026, 5:34:44 PM

Last enriched: 3/17/2026, 7:13:12 PM

Last updated: 4/28/2026, 5:24:31 AM

Views: 194

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses