Password Change Vulnerability in Fortinet FortiSwitch GUI
CVE-2024-48887

9.3CRITICAL

Key Information:

Vendor
Fortinet
Vendor
CVE Published:
8 April 2025

Badges

πŸ“ˆ TrendedπŸ“ˆ Score: 3,710πŸ“° News Worthy

What is CVE-2024-48887?

CVE-2024-48887 represents a significant security vulnerability within the Fortinet FortiSwitch graphical user interface (GUI). The FortiSwitch is an essential component in enterprise networking, facilitating the connection of various devices to a network and supporting data management. This vulnerability allows a remote unauthenticated attacker to change administrative passwords via specially crafted requests, which could severely undermine the security of the affected systems. Organizations utilizing FortiSwitch are at risk of unauthorized administrative access, which can lead to broader network compromises.

Technical Details

CVE-2024-48887 is characterized as a password change vulnerability that poses a risk due to its nature of allowing remote manipulation of admin credentials without prior authentication. The flaw stems from inadequate validation mechanisms within the FortiSwitch GUI, enabling an attacker to execute commands that alter password settings. This deficiency highlights potential weaknesses in the access control measures integral to network security management.

Potential Impact of CVE-2024-48887

  1. Unauthorized Access to Administrative Controls: An exploit of this vulnerability could grant malicious actors control over administrative functions, allowing them to manipulate network configurations and policies, leading to unauthorized network access.

  2. Increased Risk of Data Breaches: By gaining administrative access, an attacker could exfiltrate sensitive data, exposing organizations to potential compliance violations and financial losses through data breaches.

  3. Compromise of Network Integrity: The ability to alter administrative passwords can lead to a cascade of security failures, enabling attackers to install malware, redirect traffic, or conduct subsequent attacks on internal systems, jeopardizing overall network integrity.

Affected Version(s)

FortiSwitch 7.6.0

FortiSwitch 7.4.0 <= 7.4.4

FortiSwitch 7.2.0 <= 7.2.8

News Articles

FortiSwitch vulnerability may give attackers control over vulnerable devices (CVE-2024-48887) - Help Net Security

Fortinet has released patches for a vulnerability (CVE-2024-48887) in its FortiSwitch devices that could give attackers admin privileges.

5 days ago

Fortinet Urges FortiSwitch Upgrades to Patch Critical Admin Password Change Flaw

Fortinet patches CVE-2024-48887, a 9.3 CVSS FortiSwitch flaw, urging quick upgrades to avoid attacks.

1 week ago

References

CVSS V3.1

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ“ˆ

    Vulnerability started trending

  • πŸ“°

    First article discovered by The Hacker News

  • Vulnerability published

  • Vulnerability Reserved

.