CVE-2025-24472
Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability - [Actively Exploited]
Description
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.2.0 through 7.2.12, 7.0.0 through 7.0.19 may allow a remote unauthenticated attacker with prior knowledge of upstream and downstream devices serial numbers to gain super-admin privileges on the downstream device, if the Security Fabric is enabled, via crafted CSF proxy requests.
INFO
Published Date :
Feb. 11, 2025, 5:15 p.m.
Last Modified :
Oct. 24, 2025, 12:53 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
CISA KEV (Known Exploited Vulnerabilities)
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.
Fortinet FortiOS and FortiProxy contain an authentication bypass vulnerability that allows a remote attacker to gain super-admin privileges via crafted CSF proxy requests.
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
https://fortiguard.fortinet.com/psirt/FG-IR-24-535 ; https://nvd.nist.gov/vuln/detail/CVE-2025-24472
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source | 
|---|---|---|---|---|---|---|
| CVSS 3.1 | HIGH | [email protected] | 
Solution
- Update FortiOS to a non-vulnerable version.
- Update FortiProxy to a non-vulnerable version.
- Disable Security Fabric if unable to patch.
Public PoC/Exploit Available at Github
                                            CVE-2025-24472 has a 2 public
                                            PoC/Exploit available at Github.
                                            Go to the Public Exploits tab to see the list.
                                        
References to Advisories, Solutions, and Tools
                                            Here, you will find a curated list of external links that provide in-depth
                                            information, practical solutions, and valuable tools related to
                                            CVE-2025-24472.
                                        
| URL | Resource | 
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-24-535 | Vendor Advisory | 
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24472 | US Government Resource | 
CWE - Common Weakness Enumeration
            While CVE identifies
            specific instances of vulnerabilities, CWE categorizes the common flaws or
            weaknesses that can lead to vulnerabilities. CVE-2025-24472 is
            associated with the following CWEs:
        
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
            (CAPEC)
            stores attack patterns, which are descriptions of the common attributes and
            approaches employed by adversaries to exploit the CVE-2025-24472
            weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
A repo for output of an intrusion prediction project
Jupyter Notebook Python Standard ML
CISA Bot is a GitHub bot that automatically monitors the Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog. When new vulnerabilities are published in the KEV, the bot creates GitHub issues in this repository with detailed information about each vulnerability.
Python
Results are limited to the first 15 repositories due to potential performance issues.
			The following list is the news that have been mention
			CVE-2025-24472 vulnerability anywhere in the article.
		
 
									- 
                                                            
                                                                The Cyber Express 
22 Vulnerabilities Under Attack – And Another That Could Be
Cyble researchers detailed 22 vulnerabilities under active attack in a blog post today – and nine of them aren’t in CISA’s Known Exploited Vulnerabilities (KEV) catalog. Twelve of the vulnerabilities ... Read more
 
									- 
                                                            
                                                                The Hacker News 
Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery
Vulnerability / Threat Intelligence Cybersecurity researchers have disclosed a surge in "mass scanning, credential brute-forcing, and exploitation attempts" originating from IP addresses associated wi ... Read more
 
									- 
                                                            
                                                                BleepingComputer 
Critical FortiSwitch flaw lets hackers change admin passwords remotely
Fortinet has released security patches for a critical vulnerability in its FortiSwitch devices that can be exploited to change administrator passwords remotely. The company says Daniel Rozeboom of the ... Read more
 
									- 
                                                            
                                                                security.nl 
Fortinet maakt kritiek firewall-lek maand na uitkomen update bekend
Fortinet heeft een kritieke kwetsbaarheid in de firewalls en vpn-oplossingen die het biedt een maand na het uitkomen van de beveiligingsupdate bekendgemaakt. Via het beveiligingslek (CVE-2025-24472) i ... Read more
 
									- 
                                                            
                                                                BleepingComputer 
Fortinet warns of new zero-day exploited to hijack firewalls
Fortinet warned today that attackers are exploiting another now-patched zero-day bug in FortiOS and FortiProxy to hijack Fortinet firewalls and breach enterprise networks. Successful exploitation of t ... Read more
 
									- 
                                                            
                                                                BleepingComputer 
Fortinet discloses second firewall auth bypass patched in January
Update 2/11/25 07:32 PM ET: After publishing our story, Fortinet has informed us that the new CVE-2025-24472 flaw added to FG-IR-24-535 today is not a zero-day and was already fixed in January. Furthe ... Read more
                The following table lists the changes that have been made to the
                CVE-2025-24472 vulnerability over time.
            
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
- 
                            Modified Analysis by [email protected]Oct. 24, 2025 Action Type Old Value New Value Added Reference Type CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24472 Types: US Government Resource 
- 
                            CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0Oct. 21, 2025 Action Type Old Value New Value Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24472 
- 
                            CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0Oct. 21, 2025 Action Type Old Value New Value Removed Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24472 
- 
                            CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0Oct. 21, 2025 Action Type Old Value New Value Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24472 
- 
                            Modified Analysis by [email protected]Aug. 08, 2025 Action Type Old Value New Value Removed CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Removed CWE CWE-306 
- 
                            CVE Modified by [email protected]Aug. 07, 2025 Action Type Old Value New Value Changed Description An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.2.0 through 7.2.12, 7.0.0 through 7.0.19 may allow a remote attacker to gain super-admin privileges via crafted CSF proxy requests. An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.2.0 through 7.2.12, 7.0.0 through 7.0.19 may allow a remote unauthenticated attacker with prior knowledge of upstream and downstream devices serial numbers to gain super-admin privileges on the downstream device, if the Security Fabric is enabled, via crafted CSF proxy requests. 
- 
                            Initial Analysis by [email protected]Mar. 19, 2025 Action Type Old Value New Value Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Added CWE CWE-306 Added CPE Configuration OR *cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (excluding) 7.0.20 *cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* versions from (including) 7.2.0 up to (excluding) 7.2.13 *cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (excluding) 7.0.17 Added Reference Type Fortinet, Inc.: https://fortiguard.fortinet.com/psirt/FG-IR-24-535 Types: Vendor Advisory 
- 
                            CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725Mar. 19, 2025 Action Type Old Value New Value Added Date Added 2025-03-18 Added Due Date 2025-04-08 Added Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Added Vulnerability Name Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability 
- 
                            New CVE Received by [email protected]Feb. 11, 2025 Action Type Old Value New Value Added Description An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.2.0 through 7.2.12, 7.0.0 through 7.0.19 may allow a remote attacker to gain super-admin privileges via crafted CSF proxy requests. Added CVSS V3.1 AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Added CWE CWE-288 Added Reference https://fortiguard.fortinet.com/psirt/FG-IR-24-535 
 
                         
                         
                         
                                             
                                            