CVE-2024-47575 A missing authentication for critical function in FortiManager allows attacker to execute arbitrary code or commands via specially crafted requests.
- CVE ID: CVE-2024-47575
- Published: 2024-10-23
- Impact: Confidentiality
- Exploit Availability: Not public, only private.
- CVSS: 9.8
CVE-2024-47575 is a critical vulnerability in the FortiManager platform, specifically affecting its fgfmsd daemon. Classified under CWE-306, it stems from insufficient authentication for management functions in the fgfmsd service, which handles communication between FortiManager and FortiGate devices.
This flaw allows a remote attacker to send crafted requests, bypass access controls, and execute arbitrary commands on the FortiManager system, potentially compromising the network.
FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.13, FortiManager Cloud 6.4.1 through 6.4.7
To run exploit you need Python 3.9. Execute:
python exploit.py -h 10.10.10.10 -c 'uname -a'