CVE-2025-24472

critical

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.2.0 through 7.2.12, 7.0.0 through 7.0.19 may allow a remote attacker to gain super-admin privileges via crafted CSF proxy requests.

References

https://www.databreachtoday.com/fortinet-targeting-ransomware-attacks-leave-devices-patched-a-27800

https://www.darkreading.com/cyberattacks-data-breaches/critical-fortinet-vulnerability-draws-fresh-attention

https://securityaffairs.com/175583/security/u-s-cisa-adds-fortinet-fortios-fortiproxy-and-github-action-flaws-to-its-known-exploited-vulnerabilities-catalog.html

https://www.cisa.gov/news-events/alerts/2025/03/18/cisa-adds-two-known-exploited-vulnerabilities-catalog

https://therecord.media/mora001-ransomware-gang-exploiting-vulnerability-lockbit

https://www.theregister.com/2025/03/14/ransomware_gang_lockbit_ties/

https://www.darkreading.com/cyberattacks-data-breaches/actor-tied-lockbit-ransomware-targets-fortinet-users

https://www.bleepingcomputer.com/news/security/new-superblack-ransomware-exploits-fortinet-auth-bypass-flaws/

https://www.forescout.com/blog/new-ransomware-operator-exploits-fortinet-vulnerability-duo/

https://www.securityweek.com/ivanti-fortinet-patch-remote-code-execution-vulnerabilities/

https://thehackernews.com/2025/02/ivanti-patches-critical-flaws-in.html

https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-zero-day-exploited-to-hijack-firewalls/

https://www.bleepingcomputer.com/news/security/fortinet-discloses-second-firewall-auth-bypass-patched-in-january/

https://www.tenable.com/blog/cve-2024-55591-fortinet-authentication-bypass-zero-day-vulnerability-exploited-in-the-wild

https://fortiguard.fortinet.com/psirt/FG-IR-24-535

Details

Source: Mitre, NVD

Published: 2025-02-11

Updated: 2025-03-19

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical