
The US CISA has added the Fortimanager vulnerability to it Known Exploited Vulnerability Catalog based on the evidence of active exploitation. This vulnerability evolved in the last 10-15 days, with lot many discussions happening on various forums. TheCyberThrone’s had covered a Writeup on the criticality of the vulnerability
CVE-2024-47575
With a CVSS score of 9.8, it deemed to be critical and why not it can be treated as an emergency !!!. Considering the history of Fortinet devices being exploited in the past.
Fortinet FortiManager contains a missing authentication vulnerability in the fgfmd daemon that allows a remote, unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.
A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.13, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests.
The CISA has set 13 November 2024 as a deadline for federal agencies to remediate.

