
CVE-2024-24472 is a critical security vulnerability identified in Fortinet products, specifically FortiOS and FortiProxy. This vulnerability poses a significant threat to the integrity and security of the affected systems.
Vulnerability Description
Nature of the Vulnerability
CVE-2024-24472 is an authentication bypass vulnerability. This flaw allows attackers to gain super-admin privileges on affected devices without proper authentication. The vulnerability arises due to improper handling of requests in the Node.js websocket module, enabling attackers to send crafted requests that bypass authentication mechanisms.
Technical Details
Exploitation Method
The exploitation of CVE-2024-24472 involves the following steps:
- Crafting Malicious Requests: The attacker crafts specially constructed requests that exploit the vulnerability in the Node.js websocket module.
- Bypassing Authentication: These crafted requests bypass the authentication mechanisms, granting the attacker super-admin privileges.
- Gaining Unauthorized Access: With super-admin privileges, the attacker gains full control over the affected device, allowing them to perform various malicious actions.
Impact
Potential Risks
The successful exploitation of this vulnerability can lead to severe consequences, including:
- Unauthorized Administrative Access: Attackers can gain super-admin privileges, allowing them to control the device entirely.
- Account Creation: Attackers can create new accounts with administrative privileges, further securing their unauthorized access.
- Configuration Changes: Attackers can change SSL VPN configurations, potentially compromising the security of VPN connections.
- Lateral Movement: With super-admin access, attackers can move laterally within the network, potentially compromising additional systems and data.
CVSS Score and Metrics
The Common Vulnerability Scoring System (CVSS) provides a standardized way to rate the severity of vulnerabilities. For CVE-2024-24472, the CVSS scores are as follows:
- Base Score: 9.6 (Critical)
- Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- Attack Vector (AV): Network – The vulnerability can be exploited remotely over a network.
- Attack Complexity (AC): Low – The attack does not require complex conditions to be met.
- Privileges Required (PR): None – The attacker does not need any specific privileges to exploit the vulnerability.
- User Interaction (UI): None – Exploitation does not require any user interaction.
- Scope (S): Changed – Exploitation affects multiple components within the system.
- Confidentiality (C): High – Exploitation results in significant loss of confidentiality.
- Integrity (I): High – Exploitation results in significant loss of integrity.
- Availability (A): High – Exploitation results in significant loss of availability.
Affected Versions
The vulnerability affects the following versions of Fortinet products:
- FortiOS: Versions 7.0.0 through 7.0.16 (fixed in 7.0.17+)
- FortiProxy: Versions 7.0.0 through 7.0.19 (fixed in 7.0.20+) and 7.2.0 through 7.2.12 (fixed in 7.2.13+)
Mitigation Measures
To protect against the exploitation of CVE-2024-24472, organizations should implement the following mitigation measures:
1. Apply Security Patches
- Update Software: Ensure that FortiOS and FortiProxy are updated to the latest versions that include fixes for this vulnerability. Regularly check for updates and apply them promptly to minimize exposure to known vulnerabilities.
- Patch Management: Establish a robust patch management process to ensure that all software components are regularly updated to address known vulnerabilities.
2. Monitor Network Traffic
- Network Monitoring: Implement continuous monitoring of network traffic to detect and respond to any signs of unauthorized access or suspicious behavior.
- Intrusion Detection Systems (IDS): Deploy IDS to monitor network traffic and detect signs of exploitation attempts.
3. Enhance Security Configurations
- Access Controls: Review and enhance access controls to ensure that only authorized users have administrative privileges. Implement the principle of least privilege to limit the potential impact of compromised accounts.
- Web Application Firewall (WAF): Use a WAF to protect against attacks that exploit web application vulnerabilities, including the Node.js websocket module vulnerability.
Final Thoughts
CVE-2024-24472 is a critical vulnerability that requires immediate attention and remediation. By applying the recommended updates, enhancing network monitoring, and following best security practices, organizations can mitigate the risks associated with this vulnerability and protect their systems from potential exploitation.


