Subscribe

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Service

FortiSwitch Vulnerability Fixed in Urgent Fortinet Update

FortiSwitch Vulnerability Fixed in Urgent Fortinet Update FortiSwitch Vulnerability Fixed in Urgent Fortinet Update
IMAGE CREDITS: ITWORKS.ID

Fortinet has released urgent security patches for a critical vulnerability affecting its FortiSwitch product, alongside fixes for nine other security issues spanning its broader product line.

The most severe of the flaws, CVE-2024-48887, carries a CVSS score of 9.3 and impacts FortiSwitch versions 6.4 to 7.6. This high-risk bug could allow unauthenticated remote attackers to change administrative passwords through a maliciously crafted request to the FortiSwitch web interface.

Fortinet’s advisory explains, “An unverified password change vulnerability in FortiSwitch GUI may allow a remote unauthenticated attacker to modify admin passwords via a specially crafted request.” To help mitigate this threat, the company recommends disabling HTTP/HTTPS administrative access and limiting trusted hosts that can connect to the device.

To fully remediate the issue, users should upgrade to the patched versions:

  • FortiSwitch 6.4.15
  • FortiSwitch 7.0.11
  • FortiSwitch 7.2.9
  • FortiSwitch 7.4.5
  • FortiSwitch 7.6.1

More High-Severity Vulnerabilities in Fortinet Products

Fortinet has also patched CVE-2024-26013 and CVE-2024-50565, both classified as high-severity vulnerabilities. These flaws could allow attackers to conduct man-in-the-middle (MitM) attacks and intercept FGFM authentication requests between management systems and connected devices. In some cases, attackers could even impersonate key components such as FortiManager or FortiCloud.

The root cause is linked to improper restriction of communication channels, affecting a wide range of products including:

  • FortiOS
  • FortiProxy
  • FortiManager
  • FortiAnalyzer
  • FortiVoice
  • FortiWeb

FortiIsolator OS Command Injection Vulnerability

Another major concern is CVE-2024-54024, a high-severity OS command injection bug in FortiIsolator. This vulnerability allows an authenticated attacker with super-admin and CLI access to execute arbitrary commands via crafted HTTP requests. While this requires elevated access, it still poses a serious risk in compromised environments.

Additional Medium and Low Severity Fixes

Alongside the critical and high-severity issues, Fortinet addressed several medium- and low-severity vulnerabilities, including:

  • An OS command injection issue in FortiIsolator
  • A log pollution flaw in FortiManager and FortiAnalyzer
  • A user management bug in FortiWeb’s widget dashboard
  • A path traversal issue in FortiWeb
  • An insufficient credentials protection flaw in FortiOS
  • A web page input neutralization flaw in FortiClient

Although none of the patched vulnerabilities have been exploited in the wild—according to Fortinet—security experts strongly urge users to apply updates immediately. Fortinet devices are often targeted by threat actors shortly after security flaws are publicly disclosed.

Share with others