ID

VAR-202501-1996


CVE

CVE-2024-48885


TITLE

Path traversal vulnerability in multiple Fortinet products

Trust: 0.8

sources: JVNDB: JVNDB-2024-018240

DESCRIPTION

A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiRecorder versions 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiWeb versions 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.10, 6.4.0 through 6.4.3, FortiVoice versions 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.0 through 6.0.12 allows attacker to escalate privilege via specially crafted packets. FortiManager , FortiManager Cloud , FortiProxy There is a path traversal vulnerability in several Fortinet products, including:Information is tampered with and service operation is interrupted (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2024-48885 // JVNDB: JVNDB-2024-018240

AFFECTED PRODUCTS

vendor:fortinetmodel:fortiosscope:gteversion:6.4.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:gteversion:7.4.0

Trust: 1.0

vendor:fortinetmodel:fortiwebscope:eqversion:7.6.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:gteversion:7.2.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:eqversion:7.6.0

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:ltversion:7.4.4

Trust: 1.0

vendor:fortinetmodel:fortirecorderscope:ltversion:7.0.5

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:gteversion:7.4.1

Trust: 1.0

vendor:fortinetmodel:fortiproxyscope:ltversion:7.2.12

Trust: 1.0

vendor:fortinetmodel:fortiproxyscope:ltversion:7.4.6

Trust: 1.0

vendor:fortinetmodel:fortivoicescope:gteversion:7.0.0

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:ltversion:7.6.2

Trust: 1.0

vendor:fortinetmodel:fortimanager cloudscope:ltversion:7.4.4

Trust: 1.0

vendor:fortinetmodel:fortivoicescope:gteversion:6.0.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:ltversion:7.4.5

Trust: 1.0

vendor:fortinetmodel:fortirecorderscope:ltversion:7.2.2

Trust: 1.0

vendor:fortinetmodel:fortivoicescope:lteversion:7.0.5

Trust: 1.0

vendor:fortinetmodel:fortiproxyscope:gteversion:1.0.0

Trust: 1.0

vendor:fortinetmodel:fortiwebscope:ltversion:7.4.5

Trust: 1.0

vendor:fortinetmodel:fortirecorderscope:gteversion:7.2.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:ltversion:7.2.10

Trust: 1.0

vendor:fortinetmodel:fortiproxyscope:ltversion:7.0.19

Trust: 1.0

vendor:fortinetmodel:fortirecorderscope:gteversion:7.0.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:ltversion:7.0.16

Trust: 1.0

vendor:fortinetmodel:fortimanager cloudscope:gteversion:7.4.1

Trust: 1.0

vendor:fortinetmodel:fortiproxyscope:gteversion:7.4.0

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:gteversion:7.6.0

Trust: 1.0

vendor:fortinetmodel:fortiproxyscope:gteversion:7.2.0

Trust: 1.0

vendor:fortinetmodel:fortiwebscope:gteversion:6.4.0

Trust: 1.0

vendor:fortinetmodel:fortivoicescope:lteversion:6.4.10

Trust: 1.0

vendor:フォーティネットmodel:fortiwebscope: - version: -

Trust: 0.8

vendor:フォーティネットmodel:fortivoicescope: - version: -

Trust: 0.8

vendor:フォーティネットmodel:fortimanager cloudscope: - version: -

Trust: 0.8

vendor:フォーティネットmodel:fortimanagerscope: - version: -

Trust: 0.8

vendor:フォーティネットmodel:fortiproxyscope: - version: -

Trust: 0.8

vendor:フォーティネットmodel:fortiosscope: - version: -

Trust: 0.8

vendor:フォーティネットmodel:fortirecorderscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2024-018240 // NVD: CVE-2024-48885

CVSS

SEVERITY

CVSSV2

CVSSV3

psirt@fortinet.com: CVE-2024-48885
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2024-48885
value: CRITICAL

Trust: 1.0

NVD: CVE-2024-48885
value: CRITICAL

Trust: 0.8

psirt@fortinet.com: CVE-2024-48885
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.6
impactScore: 3.6
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2024-48885
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.1

Trust: 1.0

NVD: CVE-2024-48885
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2024-018240 // NVD: CVE-2024-48885 // NVD: CVE-2024-48885

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.0

problemtype:Path traversal (CWE-22) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-018240 // NVD: CVE-2024-48885

PATCH

title:FG-IR-24-259url:https://fortiguard.com/psirt/FG-IR-24-259

Trust: 0.8

sources: JVNDB: JVNDB-2024-018240

EXTERNAL IDS

db:NVDid:CVE-2024-48885

Trust: 2.6

db:ICS CERTid:ICSA-25-044-06

Trust: 0.8

db:JVNid:JVNVU95962757

Trust: 0.8

db:JVNDBid:JVNDB-2024-018240

Trust: 0.8

sources: JVNDB: JVNDB-2024-018240 // NVD: CVE-2024-48885

REFERENCES

url:https://fortiguard.fortinet.com/psirt/fg-ir-24-259

Trust: 1.0

url:https://jvn.jp/vu/jvnvu95962757/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-48885

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-06

Trust: 0.8

sources: JVNDB: JVNDB-2024-018240 // NVD: CVE-2024-48885

SOURCES

db:JVNDBid:JVNDB-2024-018240
db:NVDid:CVE-2024-48885

LAST UPDATE DATE

2025-02-21T19:45:06.532000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2024-018240date:2025-02-19T07:59:00
db:NVDid:CVE-2024-48885date:2025-02-03T21:11:41.750

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2024-018240date:2025-02-06T00:00:00
db:NVDid:CVE-2024-48885date:2025-01-16T09:15:06.737