{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2025-008.pdf"
    },
    "title": "High Vulnerabilities in Fortinet Products",
    "serial_number": "2025-008",
    "publish_date": "14-03-2025 16:00:37",
    "description": "On March 11, 2025, Fortinet released several security advisories addressing 18 vulnerabilities ranging from low to high severity.<br>\nIt is recommended updating as soon as possible.<br>\n",
    "url_title": "2025-008",
    "content_markdown": "---\ntitle: 'High Vulnerabilities in\u00a0Fortinet\u00a0Products'\nnumber: '2025-008'\nversion: '1.0'\noriginal_date: '2025-03-11'\ndate: '2025-03-14'\n---\n\n_History:_\n\n* _14/03/2025 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn March 11, 2025, Fortinet released several security advisories addressing 18 vulnerabilities ranging from low to high severity [1].\n\nIt is recommended updating as soon as possible.\n\n# Technical Details\n\n- The vulnerability **CVE-2023-48790**, with a CVSS score of 7.1, is a cross-site request forgery vulnerability in FortiNDR that may allow a remote unauthenticated attacker to execute unauthorised actions via crafted HTTP GET requests [2].\n\n- The vulnerability **CVE-2024-45324**, with a CVSS score of 7.0, is a use of externally controlled format string vulnerability in FortiOS, FortiProxy, FortiPAM, FortiSRA and FortiWeb that may allow a privileged attacker to execute unauthorised code or commands via specially crafted HTTP or HTTPS commands [3].\n\n- The vulnerability **CVE-2023-40723**, with a CVSS score of 7.7, is an exposure of sensitive information to an unauthorised actor in FortiSIEM that may allow a remote unauthenticated attacker who acquired knowledge of the agent's authorisation header by other means to read the database password via crafted api requests [4].\n\nFortinet also fixes low and medium severity vulnerabilities in their products [1].\n\n# Affected Products\n\nThe vulnerability **CVE-2023-48790** affects the following products and versions [2]:\n\n- FortiNDR 7.4 version 7.4.0\n- FortiNDR 7.2 versions 7.2.0 through 7.2.1\n- FortiNDR 7.1 versions 7.1.0 through 7.1.1\n- FortiNDR 7.0 versions 7.0.0 through 7.0.5\n- FortiNDR 1.5 all versions\n\nThe vulnerability **CVE-2024-45324** affects the following products and versions [3]:\n\n- FortiOS 7.4 versions 7.4.0 through 7.4.4\n- FortiOS 7.2 versions 7.2.0 through 7.2.9\n- FortiOS 7.0 versions 7.0.0 through 7.0.15\n- FortiOS 6.4 versions 6.4.0 through 6.4.15\n- FortiOS 6.2 all versions\n- FortiPAM 1.4 versions 1.4.0 through 1.4.2\n- FortiPAM 1.3 versions 1.3.0 through 1.3.1\n- FortiPAM 1.2 all versions\n- FortiPAM 1.1 all versions\n- FortiPAM 1.0 all versions\n- FortiProxy 7.6 version 7.6.0\n- FortiProxy 7.4 versions 7.4.0 through 7.4.6\n- FortiProxy 7.2 versions 7.2.0 through 7.2.12\n- FortiProxy 7.0 versions 7.0.0 through 7.0.19\n- FortiSRA 1.4 versions 1.4.0 through 1.4.2 \n- FortiWeb 7.6 version 7.6.0\n- FortiWeb 7.4 versions 7.4.0 through 7.4.5\n- FortiWeb 7.2 versions 7.2.0 through 7.2.10\n- FortiWeb 7.0 versions 7.0.0 through 7.0.10\n\nThe vulnerability **CVE-2023-40723** affects the following products and versions [4]:\n\n- FortiSIEM 6.7 versions 6.7.0 through 6.7.4\n- FortiSIEM 6.6 versions 6.6.0 through 6.6.3\n- FortiSIEM 6.5 versions 6.5.0 through 6.5.1\n- FortiSIEM 6.4 versions 6.4.0 through 6.4.2\n- FortiSIEM 6.3 all versions\n- FortiSIEM 6.2 all versions\n- FortiSIEM 6.1 all versions\n- FortiSIEM 5.4 all versions\n- FortiSIEM 5.3 all versions\n- FortiSIEM 5.2 all versions\n- FortiSIEM 5.1 all versions\n\n# Recommendations\n\nCERT-EU recommends updating the affected products as soon as possible to the latest version.\n\n# References\n\n[1] <https://fortiguard.fortinet.com/psirt?page=1&date=2025&severity=&product=IPS%20Engine,FortiCloud,FortiWeb,FortiSIEMWindowsAgent,FortiSwitchManager,FortiWAN,FortiWLC,FortiAP-U,FortiSandbox,FSSO%20Windows%20DC%20Agent,FortiDeceptor,FortiAuthenticator,FortiRecorder,FortiTokenMobileWP,FortiTokenIOS,FortiSwitch,FortiFone,FortiAnalyzer%20Cloud,FortiClientAndroid,FortiNAC,FortiPresence,Meru%20AP,FortiTester,FortiNDR,FortiMail,FortiSIEM,FortiClientLinux,FortiAP-W2,FortiClientEMS,FortiClientWindows,FortiDDoS-CM,FortiExtender,FortiGuest,FortiManager%20Cloud,FortiDDoS-F,FortiPAM,FortiAnalyzer-BigData,FortiIsolator,FortiEDR%20Manager,FortiProxy,FortiClientMac,FSSO%20Windows%20CA,FortiConverter,FortiSOAR,FortiSASE,FortiLANCloud,FortiTokenAndroid,FortiNAC-F,FortiAnalyzer,FortiWebManager,FortiAP-C,FortiAP,FortiOS-6K7K,FortiOS,AV%20Engine,FortiAP-S,FortiVoice,FortiAIOps,FortiDDoS,FortiClientiOS,FortiManager,FortiADC,FortiSDNConnector,FortiSRA,FortiADCManager,FortiEDR,FortiWLM,FortiPortal&component=&version=>\n\n[2] <https://fortiguard.fortinet.com/psirt/FG-IR-23-353>\n\n[3] <https://fortiguard.fortinet.com/psirt/FG-IR-24-325>\n\n[4] <https://fortiguard.fortinet.com/psirt/FG-IR-23-117>",
    "content_html": "<p><em>History:</em></p><ul><li><em>14/03/2025 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On March 11, 2025, Fortinet released several security advisories addressing 18 vulnerabilities ranging from low to high severity [1].</p><p>It is recommended updating as soon as possible.</p><h2 id=\"technical-details\">Technical Details</h2><ul><li><p>The vulnerability <strong>CVE-2023-48790</strong>, with a CVSS score of 7.1, is a cross-site request forgery vulnerability in FortiNDR that may allow a remote unauthenticated attacker to execute unauthorised actions via crafted HTTP GET requests [2].</p></li><li><p>The vulnerability <strong>CVE-2024-45324</strong>, with a CVSS score of 7.0, is a use of externally controlled format string vulnerability in FortiOS, FortiProxy, FortiPAM, FortiSRA and FortiWeb that may allow a privileged attacker to execute unauthorised code or commands via specially crafted HTTP or HTTPS commands [3].</p></li><li><p>The vulnerability <strong>CVE-2023-40723</strong>, with a CVSS score of 7.7, is an exposure of sensitive information to an unauthorised actor in FortiSIEM that may allow a remote unauthenticated attacker who acquired knowledge of the agent's authorisation header by other means to read the database password via crafted api requests [4].</p></li></ul><p>Fortinet also fixes low and medium severity vulnerabilities in their products [1].</p><h2 id=\"affected-products\">Affected Products</h2><p>The vulnerability <strong>CVE-2023-48790</strong> affects the following products and versions [2]:</p><ul><li>FortiNDR 7.4 version 7.4.0</li><li>FortiNDR 7.2 versions 7.2.0 through 7.2.1</li><li>FortiNDR 7.1 versions 7.1.0 through 7.1.1</li><li>FortiNDR 7.0 versions 7.0.0 through 7.0.5</li><li>FortiNDR 1.5 all versions</li></ul><p>The vulnerability <strong>CVE-2024-45324</strong> affects the following products and versions [3]:</p><ul><li>FortiOS 7.4 versions 7.4.0 through 7.4.4</li><li>FortiOS 7.2 versions 7.2.0 through 7.2.9</li><li>FortiOS 7.0 versions 7.0.0 through 7.0.15</li><li>FortiOS 6.4 versions 6.4.0 through 6.4.15</li><li>FortiOS 6.2 all versions</li><li>FortiPAM 1.4 versions 1.4.0 through 1.4.2</li><li>FortiPAM 1.3 versions 1.3.0 through 1.3.1</li><li>FortiPAM 1.2 all versions</li><li>FortiPAM 1.1 all versions</li><li>FortiPAM 1.0 all versions</li><li>FortiProxy 7.6 version 7.6.0</li><li>FortiProxy 7.4 versions 7.4.0 through 7.4.6</li><li>FortiProxy 7.2 versions 7.2.0 through 7.2.12</li><li>FortiProxy 7.0 versions 7.0.0 through 7.0.19</li><li>FortiSRA 1.4 versions 1.4.0 through 1.4.2 </li><li>FortiWeb 7.6 version 7.6.0</li><li>FortiWeb 7.4 versions 7.4.0 through 7.4.5</li><li>FortiWeb 7.2 versions 7.2.0 through 7.2.10</li><li>FortiWeb 7.0 versions 7.0.0 through 7.0.10</li></ul><p>The vulnerability <strong>CVE-2023-40723</strong> affects the following products and versions [4]:</p><ul><li>FortiSIEM 6.7 versions 6.7.0 through 6.7.4</li><li>FortiSIEM 6.6 versions 6.6.0 through 6.6.3</li><li>FortiSIEM 6.5 versions 6.5.0 through 6.5.1</li><li>FortiSIEM 6.4 versions 6.4.0 through 6.4.2</li><li>FortiSIEM 6.3 all versions</li><li>FortiSIEM 6.2 all versions</li><li>FortiSIEM 6.1 all versions</li><li>FortiSIEM 5.4 all versions</li><li>FortiSIEM 5.3 all versions</li><li>FortiSIEM 5.2 all versions</li><li>FortiSIEM 5.1 all versions</li></ul><h2 id=\"recommendations\">Recommendations</h2><p>CERT-EU recommends updating the affected products as soon as possible to the latest version.</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://fortiguard.fortinet.com/psirt?page=1&date=2025&severity=&product=IPS%20Engine,FortiCloud,FortiWeb,FortiSIEMWindowsAgent,FortiSwitchManager,FortiWAN,FortiWLC,FortiAP-U,FortiSandbox,FSSO%20Windows%20DC%20Agent,FortiDeceptor,FortiAuthenticator,FortiRecorder,FortiTokenMobileWP,FortiTokenIOS,FortiSwitch,FortiFone,FortiAnalyzer%20Cloud,FortiClientAndroid,FortiNAC,FortiPresence,Meru%20AP,FortiTester,FortiNDR,FortiMail,FortiSIEM,FortiClientLinux,FortiAP-W2,FortiClientEMS,FortiClientWindows,FortiDDoS-CM,FortiExtender,FortiGuest,FortiManager%20Cloud,FortiDDoS-F,FortiPAM,FortiAnalyzer-BigData,FortiIsolator,FortiEDR%20Manager,FortiProxy,FortiClientMac,FSSO%20Windows%20CA,FortiConverter,FortiSOAR,FortiSASE,FortiLANCloud,FortiTokenAndroid,FortiNAC-F,FortiAnalyzer,FortiWebManager,FortiAP-C,FortiAP,FortiOS-6K7K,FortiOS,AV%20Engine,FortiAP-S,FortiVoice,FortiAIOps,FortiDDoS,FortiClientiOS,FortiManager,FortiADC,FortiSDNConnector,FortiSRA,FortiADCManager,FortiEDR,FortiWLM,FortiPortal&component=&version=\">https://fortiguard.fortinet.com/psirt?page=1&amp;date=2025&amp;severity=&amp;product=IPS%20Engine,FortiCloud,FortiWeb,FortiSIEMWindowsAgent,FortiSwitchManager,FortiWAN,FortiWLC,FortiAP-U,FortiSandbox,FSSO%20Windows%20DC%20Agent,FortiDeceptor,FortiAuthenticator,FortiRecorder,FortiTokenMobileWP,FortiTokenIOS,FortiSwitch,FortiFone,FortiAnalyzer%20Cloud,FortiClientAndroid,FortiNAC,FortiPresence,Meru%20AP,FortiTester,FortiNDR,FortiMail,FortiSIEM,FortiClientLinux,FortiAP-W2,FortiClientEMS,FortiClientWindows,FortiDDoS-CM,FortiExtender,FortiGuest,FortiManager%20Cloud,FortiDDoS-F,FortiPAM,FortiAnalyzer-BigData,FortiIsolator,FortiEDR%20Manager,FortiProxy,FortiClientMac,FSSO%20Windows%20CA,FortiConverter,FortiSOAR,FortiSASE,FortiLANCloud,FortiTokenAndroid,FortiNAC-F,FortiAnalyzer,FortiWebManager,FortiAP-C,FortiAP,FortiOS-6K7K,FortiOS,AV%20Engine,FortiAP-S,FortiVoice,FortiAIOps,FortiDDoS,FortiClientiOS,FortiManager,FortiADC,FortiSDNConnector,FortiSRA,FortiADCManager,FortiEDR,FortiWLM,FortiPortal&amp;component=&amp;version=</a></p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://fortiguard.fortinet.com/psirt/FG-IR-23-353\">https://fortiguard.fortinet.com/psirt/FG-IR-23-353</a></p><p>[3] <a rel=\"noopener\" target=\"_blank\" href=\"https://fortiguard.fortinet.com/psirt/FG-IR-24-325\">https://fortiguard.fortinet.com/psirt/FG-IR-24-325</a></p><p>[4] <a rel=\"noopener\" target=\"_blank\" href=\"https://fortiguard.fortinet.com/psirt/FG-IR-23-117\">https://fortiguard.fortinet.com/psirt/FG-IR-23-117</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}