Known Exploited Vulnerability
9.8
CRITICAL CVSS 3.1
CVE-2024-21762
Fortinet FortiOS Out-of-Bound Write Vulnerability - [Actively Exploited]
Description

A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests

INFO

Published Date :

Feb. 9, 2024, 9:15 a.m.

Last Modified :

Oct. 24, 2025, 12:54 p.m.

Remotely Exploit :

Yes !
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

Fortinet FortiOS contains an out-of-bound write vulnerability that allows a remote unauthenticated attacker to execute code or commands via specially crafted HTTP requests.

Required Action :

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Known Ransomware Campaign Use:

Known Detected Feb 26, 2026

Notes :

https://fortiguard.fortinet.com/psirt/FG-IR-24-015 ; https://nvd.nist.gov/vuln/detail/CVE-2024-21762

Affected Products

The following products are affected by CVE-2024-21762 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Fortinet fortios
2 Fortinet fortiproxy
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 CRITICAL [email protected]
CVSS 3.1 CRITICAL [email protected]
Solution
A vulnerability in Fortinet FortiOS and FortiProxy allows for potential code execution; upgrading to a patched version is recommended.
  • Upgrade FortiOS to version 6.0.18, 6.2.16, 6.4.15, 7.0.14, 7.2.7, or 7.4.3 or later.
  • Upgrade FortiProxy to version 2.0.14, 7.0.15, 7.2.9, or 7.4.3 or later.
Public PoC/Exploit Available at Github

CVE-2024-21762 has a 103 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2024-21762.

URL Resource
https://fortiguard.com/psirt/FG-IR-24-015 Vendor Advisory
https://fortiguard.com/psirt/FG-IR-24-015 Vendor Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-21762 US Government Resource
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-21762 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2024-21762 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Python

Updated: 2 days, 4 hours ago
0 stars 0 fork 0 watcher
Born at : March 29, 2026, 8:34 p.m. This repo has been linked 3 different CVEs too.

None

Python Dockerfile

Updated: 3 days, 9 hours ago
0 stars 0 fork 0 watcher
Born at : March 28, 2026, 6:57 a.m. This repo has been linked 1 different CVEs too.

SOC Security Operations Toolkit — threat hunting, triage, reporting, network forensics, IOC scanning

Updated: 5 days, 18 hours ago
0 stars 0 fork 0 watcher
Born at : March 26, 2026, 6:07 a.m. This repo has been linked 4 different CVEs too.

RHEL 8 agentless netwerk asset scanner voor CMDB — OS, CVEs, SSL, SMB, applicaties (Log4j, VMware, Citrix, Exchange, Fortinet, Commvault, F5)

Python

Updated: 6 days, 11 hours ago
1 stars 0 fork 0 watcher
Born at : March 25, 2026, 11:33 a.m. This repo has been linked 12 different CVEs too.

CVSS v4.0 enrichment tool — Base + Threat + Environmental scoring via CISA KEV, EPSS, and NVD. Six asset profiles, CSV/JSON output, SLA recommendations.

Python

Updated: 1 week ago
0 stars 0 fork 0 watcher
Born at : March 24, 2026, 5:20 a.m. This repo has been linked 5 different CVEs too.

None

Updated: 1 week, 1 day ago
0 stars 0 fork 0 watcher
Born at : March 23, 2026, 4:17 p.m. This repo has been linked 12 different CVEs too.

None

Python

Updated: 1 week, 5 days ago
0 stars 0 fork 0 watcher
Born at : March 19, 2026, 10:45 a.m. This repo has been linked 1 different CVEs too.

CVE/vulnerability intelligence MCP server — NVD, EPSS, KEV, GitHub Advisory, OSV

TypeScript JavaScript

Updated: 1 week, 5 days ago
2 stars 1 fork 1 watcher
Born at : March 15, 2026, 1:47 p.m. This repo has been linked 5 different CVEs too.

A python based passive and active security scanner

Python

Updated: 2 weeks, 1 day ago
1 stars 0 fork 0 watcher
Born at : March 14, 2026, 6:13 p.m. This repo has been linked 21 different CVEs too.

None

Python

Updated: 2 weeks, 5 days ago
0 stars 0 fork 0 watcher
Born at : March 12, 2026, 5:18 p.m. This repo has been linked 1 different CVEs too.

Distributed honeypot intelligence platform with LLM-powered adaptive deception, RL engagement scoring, automated SIEM rule generation (Suricata/Sigma/YARA), ML anomaly detection, and C2/covert channel detection. 55M+ events from 22K+ IPs across 122 countries. Rules auto-synced every 6h.

Shell Dockerfile Python YARA

Updated: 3 days, 7 hours ago
3 stars 0 fork 0 watcher
Born at : March 11, 2026, 2:22 p.m. This repo has been linked 34 different CVEs too.

Advanced Phishing & Reconnaissance Framework

Shell Python Batchfile CSS JavaScript PHP HTML

Updated: 2 weeks, 6 days ago
0 stars 0 fork 0 watcher
Born at : March 11, 2026, 3:43 a.m. This repo has been linked 5 different CVEs too.

his repository is a curated collection of skills, plugins, and automation pipelines designed for Claude Code — Anthropic's CLI for AI-assisted software engineering. It was built by the engineering and security engineering teams at Phoenix Security and released as open source so that security professionals, DevSecOps engineers, AppSec teams

JavaScript Shell Python

Updated: 1 week, 4 days ago
14 stars 1 fork 1 watcher
Born at : March 8, 2026, 4:32 p.m. This repo has been linked 1 different CVEs too.

Multi-agent CVE analysis tool running fully locally via Ollama. No API keys required.

Python

Updated: 4 weeks, 1 day ago
0 stars 0 fork 0 watcher
Born at : March 2, 2026, 4:20 p.m. This repo has been linked 3 different CVEs too.

None

Python

Updated: 2 weeks, 5 days ago
0 stars 0 fork 0 watcher
Born at : March 2, 2026, 2:36 p.m. This repo has been linked 1 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-21762 vulnerability anywhere in the article.

  • Google Cloud
Ransomware Under Pressure: Tactics, Techniques, and Procedures in a Shifting Threat Landscape

Written by: Bavi Sadayappan, Zach Riddle, Ioana Teaca, Kimberly Goody, Genevieve Stark Introduction Since 2018, when many financially motivated threat actors began shifting their monetization strategy ... Read more

Published Date: Mar 16, 2026 (2 weeks, 1 day ago)
  • Daily CyberSecurity
Exploited in the Wild: Critical Ivanti EPMM RCE Flaws (CVSS 9.8) Under Attack

Ivanti has issued an urgent security advisory confirming that attackers are actively exploiting critical vulnerabilities in its Endpoint Manager Mobile (EPMM) solution. The flaws, which allow unauthen ... Read more

Published Date: Jan 30, 2026 (2 months ago)
  • Daily CyberSecurity
Exploited in the Wild: Critical Modular DS Flaw CVE-2026-23550 (CVSS 10) Allows Instant Admin Takeover

A critical privilege escalation vulnerability, tracked as CVE-2026-23550 (CVSS 10), has been discovered in the Modular DS WordPress plugin, actively exposing over 40,000 websites to unauthorized admin ... Read more

Published Date: Jan 15, 2026 (2 months, 2 weeks ago)
  • Daily CyberSecurity
Holiday ColdFusion Attacks Reveal Massive 2.5 Million Request Onslaught

What started as a seemingly targeted holiday raid on Adobe ColdFusion servers has unraveled into a sprawling, industrial-scale cyberattack operation. A new intelligence update from GreyNoise reveals t ... Read more

Published Date: Dec 29, 2025 (3 months ago)
  • CybersecurityNews
Ransomware Attack 2025 Recap – From Critical Data Extortion to Operational Disruption

The ransomware landscape in 2025 has reached new heights, evolving from a cybersecurity issue into a strategic threat to national security and global economic stability. This year saw a 34%-50% surge ... Read more

Published Date: Dec 19, 2025 (3 months, 1 week ago)
  • Daily CyberSecurity
“React2Shell” Storm: China-Nexus Groups Weaponize Critical React Flaw Hours After Disclosure

Only hours after the public disclosure of a critical vulnerability in the React ecosystem, state-sponsored cyber espionage groups have already launched active exploitation campaigns. Amazon threat int ... Read more

Published Date: Dec 05, 2025 (3 months, 3 weeks ago)
  • Daily CyberSecurity
CVE-2025-5821: Critical Authentication Bypass in WordPress Case Theme User Plugin Exploited in the Wild

Hackers are exploiting a critical authentication bypass vulnerability in the Case Theme User plugin, a WordPress plugin with an estimated 12,000 active installations. This plugin is bundled in multipl ... Read more

Published Date: Sep 16, 2025 (6 months, 2 weeks ago)
  • Kaspersky
IT threat evolution in Q2 2025. Non-mobile statistics

IT threat evolution in Q2 2025. Non-mobile statistics IT threat evolution in Q2 2025. Mobile statistics The statistics in this report are based on detection verdicts returned by Kaspersky products unl ... Read more

Published Date: Sep 05, 2025 (6 months, 3 weeks ago)
  • Daily CyberSecurity
CRITICAL Zero-Day CVE-2025-57819 in FreePBX Is Under Active Attack (CVSS 10.0)

The Sangoma FreePBX Security Team has issued a critical advisory for a newly discovered vulnerability in its popular open-source telephony platform. Tracked as CVE-2025-57819 with a maximum CVSSv4 sco ... Read more

Published Date: Aug 29, 2025 (7 months ago)
  • BleepingComputer
Nissan confirms design studio data breach claimed by Qilin ransomware

Nissan Japan has confirmed to BleepingComputer that it suffered a data breach following unauthorized access to a server of one of its subsidiaries, Creative Box Inc. (CBI). This came in response to th ... Read more

Published Date: Aug 26, 2025 (7 months ago)
  • Daily CyberSecurity
Critical Command Injection Flaws in Trend Micro Apex One Actively Exploited

Trend Micro has issued an urgent advisory for two critical command injection vulnerabilities affecting its Apex One (on-prem) management console for Windows. Both vulnerabilities—CVE-2025-54948 and CV ... Read more

Published Date: Aug 05, 2025 (7 months, 3 weeks ago)
  • BleepingComputer
The Heat Wasn't Just Outside: Cyber Attacks Spiked in Summer 2025

Summer 2025 wasn't just hot; it was relentless. Ransomware hammered hospitals, retail giants suffered data breaches, insurance firms were hit by phishing, and nation-state actors launched disruptive c ... Read more

Published Date: Aug 05, 2025 (7 months, 3 weeks ago)
  • Daily CyberSecurity
Urgent Citrix NetScaler Alert: Critical Memory Overflow Flaw (CVE-2025-6543, CVSS 9.2) Actively Exploited on 2,100+ Unpatched Appliances

A critical security flaw tracked as CVE-2025-6543 is being actively exploited in the wild, prompting urgent warnings from Citrix and inclusion in CISA’s Known Exploited Vulnerabilities (KEV) Catalog. ... Read more

Published Date: Jul 01, 2025 (8 months, 4 weeks ago)
  • Cyber Security News
CISA Releases Guide to Protect Network Edge Devices From Hackers

CISA and international cybersecurity partners have released a comprehensive suite of guidance documents aimed at protecting critical network edge devices from increasingly sophisticated cyberattacks. ... Read more

Published Date: Jun 12, 2025 (9 months, 2 weeks ago)
  • The Hacker News
Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks

Former members tied to the Black Basta ransomware operation have been observed sticking to their tried-and-tested approach of email bombing and Microsoft Teams phishing to establish persistent access ... Read more

Published Date: Jun 11, 2025 (9 months, 2 weeks ago)
  • Cyber Security News
Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware

A new wave of cyberattacks has emerged targeting critical infrastructure through the exploitation of Fortigate security appliance vulnerabilities, with threat actors successfully deploying the notorio ... Read more

Published Date: Jun 09, 2025 (9 months, 3 weeks ago)
  • BleepingComputer
Critical Fortinet flaws now exploited in Qilin ransomware attacks

The Qilin ransomware operation has recently joined attacks exploiting two Fortinet vulnerabilities that allow bypassing authentication on vulnerable devices and executing malicious code remotely. Qili ... Read more

Published Date: Jun 06, 2025 (9 months, 3 weeks ago)
  • Daily CyberSecurity
BitoPro Silent on $11.5M Hack: Investigator Uncovers Massive Crypto Theft

Cryptocurrency investigator @zachxbt, while analyzing on-chain transactions, uncovered a suspicious movement of funds linked to the Taiwanese cryptocurrency exchange BitoPro. Approximately $11.5 milli ... Read more

Published Date: Jun 03, 2025 (9 months, 4 weeks ago)
  • Daily CyberSecurity
Zero-Day CLFS Vulnerability (CVE-2025-29824) Exploited in Ransomware Attacks

Symantec’s Threat Hunter Team has uncovered a sophisticated attack involving a zero-day privilege escalation vulnerability in Microsoft’s Common Log File System (CLFS) driver — CVE-2025-29824 — active ... Read more

Published Date: May 07, 2025 (10 months, 3 weeks ago)
  • Daily CyberSecurity
DslogdRAT Malware Targets Ivanti Connect Secure via CVE-2025-0282 Zero-Day Exploit

A newly published report by Yuma Masubuchi from the JPCERT Coordination Center (JPCERT/CC) has uncovered the deployment of a stealthy remote access trojan dubbed DslogdRAT, which was installed on comp ... Read more

Published Date: Apr 26, 2025 (11 months ago)

The following table lists the changes that have been made to the CVE-2024-21762 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Modified Analysis by [email protected]

    Oct. 24, 2025

    Action Type Old Value New Value
    Added Reference Type CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-21762 Types: US Government Resource
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Oct. 21, 2025

    Action Type Old Value New Value
    Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-21762
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Oct. 21, 2025

    Action Type Old Value New Value
    Removed Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-21762
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Oct. 21, 2025

    Action Type Old Value New Value
    Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-21762
  • Modified Analysis by [email protected]

    Nov. 29, 2024

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* versions from (including) 1.0.0 up to (excluding) 2.0.14 *cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (excluding) 7.0.15 *cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* versions from (including) 7.2.0 up to (excluding) 7.2.9 *cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* versions from (including) 7.4.0 up to (excluding) 7.4.3 *cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* versions from (including) 6.0.0 up to (excluding) 6.2.16 *cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* versions from (including) 6.4.0 up to (excluding) 6.4.15 *cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (excluding) 7.0.14 *cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* versions from (including) 7.2.0 up to (excluding) 7.2.7 *cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* versions from (including) 7.4.0 up to (excluding) 7.4.3 OR *cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* versions from (including) 1.0.0 up to (excluding) 2.0.14 *cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (excluding) 7.0.15 *cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* versions from (including) 7.2.0 up to (excluding) 7.2.9 *cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* versions from (including) 7.4.0 up to (excluding) 7.4.3 *cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* versions from (including) 6.0.0 up to (excluding) 6.0.18 *cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* versions from (including) 6.2.0 up to (excluding) 6.2.16 *cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* versions from (including) 6.4.0 up to (excluding) 6.4.15 *cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (excluding) 7.0.14 *cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* versions from (including) 7.2.0 up to (excluding) 7.2.7 *cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* versions from (including) 7.4.0 up to (excluding) 7.4.3
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://fortiguard.com/psirt/FG-IR-24-015
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    Feb. 13, 2024

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://fortiguard.com/psirt/FG-IR-24-015 No Types Assigned https://fortiguard.com/psirt/FG-IR-24-015 Vendor Advisory
    Added CPE Configuration OR *cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* versions from (including) 1.0.0 up to (excluding) 2.0.14 *cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (excluding) 7.0.15 *cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* versions from (including) 7.2.0 up to (excluding) 7.2.9 *cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* versions from (including) 7.4.0 up to (excluding) 7.4.3 *cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* versions from (including) 6.0.0 up to (excluding) 6.2.16 *cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* versions from (including) 6.4.0 up to (excluding) 6.4.15 *cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (excluding) 7.0.14 *cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* versions from (including) 7.2.0 up to (excluding) 7.2.7 *cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* versions from (including) 7.4.0 up to (excluding) 7.4.3
  • CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725

    Feb. 10, 2024

    Action Type Old Value New Value
    Added Date Added 2024-02-09
    Added Required Action Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
    Added Due Date 2024-02-16
    Added Vulnerability Name Fortinet FortiOS Out-of-Bound Write Vulnerability
  • CVE Received by [email protected]

    Feb. 09, 2024

    Action Type Old Value New Value
    Added Description A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests
    Added Reference Fortinet, Inc. https://fortiguard.com/psirt/FG-IR-24-015 [No types assigned]
    Added CWE Fortinet, Inc. CWE-787
    Added CVSS V3.1 Fortinet, Inc. AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.