National Cyber Warfare Foundation (NCWF)

Critical Fortinet FortiSwitch flaw allows remote attackers to change admin passwords


0 user ratings
2025-04-09 18:24:14
milo
Blue Team (CND)
Fortinet addressed a critical vulnerability in its FortiSwitch devices that can be exploited to change administrator passwords remotely. Fortinet has released security updates to address a critical vulnerability, tracked as CVE-2024-48887 (CVSS score 9.8), in its FortiSwitch devices. A remote attacker can exploit the vulnerability to change administrator passwords. “An unverified password change vulnerability [CWE-620] […


Fortinet addressed a critical vulnerability in its FortiSwitch devices that can be exploited to change administrator passwords remotely.





Fortinet has released security updates to address a critical vulnerability, tracked as CVE-2024-48887 (CVSS score 9.8), in its FortiSwitch devices. A remote attacker can exploit the vulnerability to change administrator passwords.





“An unverified password change vulnerability [CWE-620] in FortiSwitch GUI may allow a remote unauthenticated attacker to modify admin passwords via a specially crafted request.” reads the advisory.





The vulnerability was internally discovered and reported by Daniel Rozeboom of the FortiSwitch web UI development team.





The flaw impacts the following versions:





VersionAffectedSolution
FortiSwitch 7.67.6.0Upgrade to 7.6.1 or above
FortiSwitch 7.47.4.0 through 7.4.4Upgrade to 7.4.5 or above
FortiSwitch 7.27.2.0 through 7.2.8Upgrade to 7.2.9 or above
FortiSwitch 7.07.0.0 through 7.0.10Upgrade to 7.0.11 or above
FortiSwitch 6.46.4.0 through 6.4.14Upgrade to 6.4.15 or above




Fortinet advises disabling HTTP/HTTPS admin access and limiting FortiSwitch access to trusted hosts as a temporary workaround for unpatched systems.





In June 2024, Fortinet addressed the flaw CVE-2024-26010, a stack-based overflow vulnerability [CWE-124] in FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager that could allow a remote attacker to execute arbitrary code or commands by sending crafted packets to the fgfmd daemon. However, the exploitability of this vulnerability depends on specific conditions that are not controllable by the attacker.





Follow me on Twitter: @securityaffairs and Facebook and Mastodon





Pierluigi Paganini





(SecurityAffairs – hacking, Fortinet)



Source: SecurityAffairs
Source Link: https://securityaffairs.com/176380/security/fortinet-fortiswitch-flaw.html


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Blue Team (CND)



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.