CVE-2024-50568

June 10, 2025, 5:19 p.m.

5.9
Medium

Description

A channel accessible by non-endpoint vulnerability [CWE-300] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7 and before 7.0.14 & FortiProxy version 7.4.0 through 7.4.3, 7.2.0 through 7.2.9 and before 7.0.16 allows an unauthenticated attacker with the knowledge of device specific data to spoof the identity of a downstream device of the security fabric via crafted TCP requests.

Product(s) Impacted

Vendor Product Versions
Fortinet
  • Fortios
  • Fortiproxy
  • 7.4.0-7.4.3, 7.2.0-7.2.7, <7.0.14
  • 7.4.0-7.4.3, 7.2.0-7.2.9, <7.0.16

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-300
Channel Accessible by Non-Endpoint
The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a fortinet fortios 7.4.0-7.4.3 / / / / / / /
a fortinet fortios 7.2.0-7.2.7 / / / / / / /
a fortinet fortios <7.0.14 / / / / / / /
a fortinet fortiproxy 7.4.0-7.4.3 / / / / / / /
a fortinet fortiproxy 7.2.0-7.2.9 / / / / / / /
a fortinet fortiproxy <7.0.16 / / / / / / /

CVSS Score

5.9 / 10

CVSS Data - 3.1

  • Attack Vector: NETWORK
  • Attack Complexity: HIGH
  • Privileges Required: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: HIGH
  • Availability Impact: NONE
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

    View Vector String

Timeline

Published: June 10, 2025, 5:19 p.m.
Last Modified: June 10, 2025, 5:19 p.m.

Status : Received

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

psirt@fortinet.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.