Known Exploited Vulnerability
9.8
CRITICAL CVSS 3.1
CVE-2024-47575
Fortinet FortiManager Missing Authentication Vulnerability - [Actively Exploited]
Description

A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests.

INFO

Published Date :

Oct. 23, 2024, 3:15 p.m.

Last Modified :

Nov. 8, 2024, 9:16 p.m.

Remotely Exploit :

Yes !
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

Fortinet FortiManager contains a missing authentication vulnerability in the fgfmd daemon that allows a remote, unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.

Required Action :

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Notes :

https://fortiguard.fortinet.com/psirt/FG-IR-24-423 ; https://nvd.nist.gov/vuln/detail/CVE-2024-47575

Affected Products

The following products are affected by CVE-2024-47575 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Fortinet fortimanager
2 Fortinet fortimanager_cloud
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 CRITICAL [email protected]
CVSS 3.1 CRITICAL [email protected]
Solution
This information is provided by the 3rd party feeds.
  • Update FortiManager to version 6.2.13, 6.4.15, 7.0.13, 7.2.8, 7.4.5 or 7.6.1 or later.
Public PoC/Exploit Available at Github

CVE-2024-47575 has a 47 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2024-47575.

URL Resource
https://fortiguard.fortinet.com/psirt/FG-IR-24-423 Exploit Mitigation Vendor Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-47575 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Updated: 1 week, 2 days ago
0 stars 0 fork 0 watcher
Born at : Aug. 15, 2025, 9:07 a.m. This repo has been linked 310 different CVEs too.

PoC for CVE-2024-47575

Python Shell

Updated: 1 month ago
0 stars 0 fork 0 watcher
Born at : July 19, 2025, 9:07 p.m. This repo has been linked 1 different CVEs too.

备份的漏洞库,3月开始我们来维护

Updated: 1 month, 1 week ago
2 stars 0 fork 0 watcher
Born at : June 30, 2025, 9:14 a.m. This repo has been linked 216 different CVEs too.

None

Updated: 2 months, 1 week ago
0 stars 0 fork 0 watcher
Born at : June 15, 2025, 2:32 a.m. This repo has been linked 216 different CVEs too.

CVE POC repo 자동 수집기

Python

Updated: 13 hours, 27 minutes ago
0 stars 1 fork 1 watcher
Born at : June 8, 2025, 3:07 p.m. This repo has been linked 125 different CVEs too.

None

Updated: 2 months, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : May 30, 2025, 2:59 a.m. This repo has been linked 213 different CVEs too.

None

HTML

Updated: 3 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : May 6, 2025, 2:20 a.m. This repo has been linked 201 different CVEs too.

wy876

Python

Updated: 1 month, 2 weeks ago
8 stars 2 fork 2 watcher
Born at : April 11, 2025, 4:25 a.m. This repo has been linked 209 different CVEs too.

wy876 POC | wy876的poc仓库已删库,该项目为其仓库镜像

Updated: 1 month ago
349 stars 196 fork 196 watcher
Born at : March 7, 2025, 10:17 a.m. This repo has been linked 201 different CVEs too.

备份的漏洞库,3月开始我们来维护

Updated: 1 month ago
1382 stars 392 fork 392 watcher
Born at : March 4, 2025, 2:54 p.m. This repo has been linked 216 different CVEs too.

2023HW漏洞整理,收集整理漏洞EXp/POC,大部分漏洞来源网络,目前收集整理了300多个poc/exp,长期更新。

Updated: 3 months, 3 weeks ago
1 stars 1 fork 1 watcher
Born at : March 3, 2025, 6:09 a.m. This repo has been linked 177 different CVEs too.

漏洞文库 wiki.wy876.cn

HTML

Updated: 1 month ago
77 stars 56 fork 56 watcher
Born at : Feb. 26, 2025, 9:46 a.m. This repo has been linked 201 different CVEs too.

CVE POC Exploit

Python

Updated: 7 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Jan. 5, 2025, 8:06 p.m. This repo has been linked 1 different CVEs too.

CVE POC Exploit

Python

Updated: 7 months, 2 weeks ago
1 stars 1 fork 1 watcher
Born at : Jan. 5, 2025, 2:54 a.m. This repo has been linked 1 different CVEs too.

一个备份全网最新POC并整合的项目🤔

Updated: 7 months, 4 weeks ago
1 stars 0 fork 0 watcher
Born at : Dec. 25, 2024, 6:07 a.m. This repo has been linked 7 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-47575 vulnerability anywhere in the article.

  • Google Cloud
M-Trends 2025: Data, Insights, and Recommendations From the Frontlines

One of the ways threat actors keep up with the constantly evolving cyber defense landscape is by raising the level of sophistication of their attacks. This trend can be seen across many of our engagem ... Read more

Published Date: Apr 23, 2025 (4 months ago)
  • TheCyberThrone
Threat Actors anchors Symlink trick on Fortinet Devices

The symlink trick is a post-exploitation technique used by attackers to maintain access to Fortinet devices even after initial vulnerabilities have been patched. This exploitation method leverages sym ... Read more

Published Date: Apr 12, 2025 (4 months, 1 week ago)
  • BleepingComputer
Critical FortiSwitch flaw lets hackers change admin passwords remotely

Fortinet has released security patches for a critical vulnerability in its FortiSwitch devices that can be exploited to change administrator passwords remotely. The company says Daniel Rozeboom of the ... Read more

Published Date: Apr 09, 2025 (4 months, 2 weeks ago)
  • TheCyberThrone
CVE-2024-55591 Exploit Code Released for FortiOS Flaw

Cybersecurity company watchTowr Labs has released the proof-of-concept (PoC) exploit code for a severe zero-day vulnerability, CVE-2024-55591, affecting Fortinet’s FortiOS and FortiProxy products. Thi ... Read more

Published Date: Jan 30, 2025 (6 months, 3 weeks ago)
  • TheCyberThrone
CVE-2023-37936 impacts Fortinet FortiSwitch

CVE-2023-37936 is a critical security vulnerability identified in Fortinet FortiSwitch devices. This vulnerability is particularly severe due to its potential to allow unauthorized code execution, lea ... Read more

Published Date: Jan 16, 2025 (7 months, 1 week ago)
  • TheCyberThrone
CISA adds Fortinet flaw CVE-2024-55591 to KEV Catalog

CVE-2024-55591 is a critical vulnerability affecting Fortinet’s FortiOS and FortiProxy devices. This vulnerability allows a remote attacker to bypass authentication mechanisms and gain super-admin pri ... Read more

Published Date: Jan 15, 2025 (7 months, 1 week ago)
  • Help Net Security
Fortinet fixes FortiOS zero-day exploited by attackers for months (CVE-2024-55591)

Fortinet has patched an authentication bypass vulnerability (CVE-2024-55591) affecting its FortiOS firewalls and FortiProxy web gateways that has been exploited as a zero-day by attackers to compromis ... Read more

Published Date: Jan 14, 2025 (7 months, 1 week ago)
  • BleepingComputer
Fortinet warns of auth bypass zero-day exploited to hijack firewalls

Attackers are exploiting a new authentication bypass zero-day vulnerability in FortiOS and FortiProxy to hijack Fortinet firewalls and breach enterprise networks. This security flaw (tracked as CVE-20 ... Read more

Published Date: Jan 14, 2025 (7 months, 1 week ago)
  • Cybersecurity News
Four-Faith Industrial Routers Under Attack: CVE-2024-12856 Exploited in the Wild

VulnCheck, a renowned cybersecurity research organization, has recently issued a warning concerning active exploitation of a critical vulnerability affecting Four-Faith industrial routers. The vulnera ... Read more

Published Date: Dec 30, 2024 (7 months, 3 weeks ago)
  • TheCyberThrone
Fortinet fixes several vulnerabilities including CVE-2023-34990

Fortinet has released patches for vulnerabilities affecting its popular products, including FortiClient VPN, FortiManager, and FortiWLM. These flaws range from password exposure to remote code executi ... Read more

Published Date: Dec 19, 2024 (8 months ago)
  • Cybersecurity News
I-O DATA Routers Under Attack: Urgent Firmware Update Needed!

Multiple vulnerabilities have been discovered in I-O DATA routers UD-LT1 and UD-LT1/EX, and active exploitation is already underway. JPCERT/CC, a Japanese cybersecurity organization, issued a warning ... Read more

Published Date: Dec 04, 2024 (8 months, 2 weeks ago)
  • Cybersecurity News
RomCom Exploits Zero-Days in Firefox (CVE-2024-9680) & Windows (CVE-2024-49039) with No User Interaction

Exploit chain to compromise the victim | Image: ESETIn a recent cybersecurity report, ESET researchers have unveiled a coordinated attack by the Russia-aligned threat actor RomCom, exploiting zero-day ... Read more

Published Date: Nov 27, 2024 (8 months, 4 weeks ago)
  • TheCyberThrone
Broadcom repatched VMware bugs for the second time

Vmware vulnerabilities have been exploited in attacks after the initial released patches failed to fix the flawThe vulnerabilities are tracked  as CVE-2024-38812 and CVE-2024-38813, released on Septem ... Read more

Published Date: Nov 19, 2024 (9 months ago)
  • TheCyberThrone
Apache Kafka affected by CVE-2024-31141

The open-source event streaming platform Apache Kafka has been affected by a vulnerability the that could allow attackers to gain unauthorized access to sensitive information.The vulnerability tracked ... Read more

Published Date: Nov 19, 2024 (9 months ago)
  • TheCyberThrone
CISA KEV Catalog Update Part IV- November 2024

The U.S. CISA added the following vulnerabilities to its Known Exploited Vulnerabilities catalogCVE-2024-1212 with a CVSS score of 10 and CWE-78, is a Progress Kemp LoadMaster OS command injection iss ... Read more

Published Date: Nov 19, 2024 (9 months ago)
  • TheCyberThrone
POC Exploit Released for Fortinet Bug CVE-2024-47575

Security researcher Sina Kheirkhah from watchTowr recently published technical details and a PoC exploit for a critical zero-day vulnerability in critical flaw in FortiManager and FortiAnalyzer device ... Read more

Published Date: Nov 18, 2024 (9 months ago)
  • TheCyberThrone
Zoho Patched CVE-2024-49574 Manage Engine Bug

Zoho has released a security update addressing a critical SQL injection vulnerability in its ADAudit Plus software that allowed an attacker with authenticated access to the system to execute arbitrary ... Read more

Published Date: Nov 18, 2024 (9 months ago)
  • Cybersecurity News
CVE-2024-11120 (CVSS 9.8): OS Command Injection Flaw in GeoVision Devices Actively Exploited, No Patch

The Taiwan Computer Emergency Response Team / Coordination Center (TWCERT/CC) has issued a warning about an actively exploited critical vulnerability in certain end-of-life (EOL) GeoVision devices. Tr ... Read more

Published Date: Nov 15, 2024 (9 months, 1 week ago)
  • Cybersecurity News
Ivanti Connect Secure, Policy Secure and Secure Access Client Affected by Critical Vulnerabilities

Ivanti has released urgent security updates to address a range of vulnerabilities, including critical remote code execution (RCE) flaws, in its Connect Secure, Policy Secure, and Secure Access Client ... Read more

Published Date: Nov 13, 2024 (9 months, 1 week ago)
  • Cybersecurity News
CVE-2024-10575 (CVSS 10): Critical Flaw in Schneider Electric’s EcoStruxure IT Gateway

Schneider Electric has published a security notification about a critical vulnerability in its EcoStruxure™ IT Gateway platform, which connects IT infrastructure devices to the cloud for monitoring an ... Read more

Published Date: Nov 13, 2024 (9 months, 1 week ago)

The following table lists the changes that have been made to the CVE-2024-47575 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Modified Analysis by [email protected]

    Nov. 08, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Nov. 07, 2024

    Action Type Old Value New Value
    Changed Description A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.13, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests. A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests.
  • Initial Analysis by [email protected]

    Oct. 24, 2024

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://fortiguard.fortinet.com/psirt/FG-IR-24-423 No Types Assigned https://fortiguard.fortinet.com/psirt/FG-IR-24-423 Exploit, Mitigation, Vendor Advisory
    Added CPE Configuration OR *cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* versions from (including) 6.2.0 up to (excluding) 6.2.13 *cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* versions from (including) 6.4.0 up to (excluding) 6.4.15 *cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (excluding) 7.0.13 *cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* versions from (including) 7.2.0 up to (excluding) 7.2.8 *cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* versions from (including) 7.4.0 up to (excluding) 7.4.5 *cpe:2.3:a:fortinet:fortimanager:7.6.0:*:*:*:*:*:*:* *cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:* versions from (including) 6.4.1 up to (including) 6.4.7 *cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:* versions from (including) 7.0.1 up to (excluding) 7.0.13 *cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:* versions from (including) 7.2.1 up to (excluding) 7.2.8 *cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:* versions from (including) 7.4.1 up to (excluding) 7.4.5
  • CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725

    Oct. 24, 2024

    Action Type Old Value New Value
    Added Vulnerability Name Fortinet FortiManager Missing Authentication Vulnerability
    Added Due Date 2024-11-13
    Added Required Action Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
    Added Date Added 2024-10-23
  • CVE Received by [email protected]

    Oct. 23, 2024

    Action Type Old Value New Value
    Added Description A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.13, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests.
    Added Reference Fortinet, Inc. https://fortiguard.fortinet.com/psirt/FG-IR-24-423 [No types assigned]
    Added CWE Fortinet, Inc. CWE-306
    Added CVSS V3.1 Fortinet, Inc. AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 9.8
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact