ID

VAR-202504-1837


CVE

CVE-2024-48887


TITLE

fortinet's  FortiSwitch  Unverified password change vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2024-026440

DESCRIPTION

A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a specially crafted request. fortinet's FortiSwitch contains an unverified password change vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Fortinet FortiSwitch is a network switch management tool from Fortinet, an American company. Fortinet FortiSwitch has an authorization issue vulnerability, which stems from unauthenticated password changes. Attackers can exploit this vulnerability to cause the administrator password to be tampered with

Trust: 2.16

sources: NVD: CVE-2024-48887 // JVNDB: JVNDB-2024-026440 // CNVD: CNVD-2025-12795

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-12795

AFFECTED PRODUCTS

vendor:fortinetmodel:fortiswitchscope:eqversion:7.6.0

Trust: 1.6

vendor:fortinetmodel:fortiswitchscope:ltversion:7.2.9

Trust: 1.0

vendor:fortinetmodel:fortiswitchscope:ltversion:7.0.11

Trust: 1.0

vendor:fortinetmodel:fortiswitchscope:gteversion:7.4.0

Trust: 1.0

vendor:fortinetmodel:fortiswitchscope:gteversion:6.4.0

Trust: 1.0

vendor:fortinetmodel:fortiswitchscope:gteversion:7.0.0

Trust: 1.0

vendor:fortinetmodel:fortiswitchscope:gteversion:7.2.0

Trust: 1.0

vendor:fortinetmodel:fortiswitchscope:ltversion:6.4.15

Trust: 1.0

vendor:fortinetmodel:fortiswitchscope:ltversion:7.4.5

Trust: 1.0

vendor:フォーティネットmodel:fortiswitchscope:eqversion:7.4.0 that's all 7.4.5

Trust: 0.8

vendor:フォーティネットmodel:fortiswitchscope:eqversion:6.4.0 that's all 6.4.15

Trust: 0.8

vendor:フォーティネットmodel:fortiswitchscope:eqversion:7.6.0

Trust: 0.8

vendor:フォーティネットmodel:fortiswitchscope:eqversion:7.2.0 that's all 7.2.9

Trust: 0.8

vendor:フォーティネットmodel:fortiswitchscope:eqversion: -

Trust: 0.8

vendor:フォーティネットmodel:fortiswitchscope:eqversion:7.0.0 that's all 7.0.11

Trust: 0.8

vendor:fortinetmodel:fortiswitchscope:gteversion:7.4.0,<=7.4.4

Trust: 0.6

vendor:fortinetmodel:fortiswitchscope:gteversion:7.2.0,<=7.2.8

Trust: 0.6

vendor:fortinetmodel:fortiswitchscope:gteversion:7.0.0,<=7.0.10

Trust: 0.6

vendor:fortinetmodel:fortiswitchscope:gteversion:6.4.0,<=6.4.14

Trust: 0.6

sources: CNVD: CNVD-2025-12795 // JVNDB: JVNDB-2024-026440 // NVD: CVE-2024-48887

CVSS

SEVERITY

CVSSV2

CVSSV3

psirt@fortinet.com: CVE-2024-48887
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2024-026440
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-12795
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-12795
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

psirt@fortinet.com: CVE-2024-48887
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2024-026440
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-12795 // JVNDB: JVNDB-2024-026440 // NVD: CVE-2024-48887

PROBLEMTYPE DATA

problemtype:CWE-620

Trust: 1.0

problemtype:Unverified password change (CWE-620) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-026440 // NVD: CVE-2024-48887

PATCH

title:FG-IR-24-435url:https://fortiguard.com/psirt/FG-IR-24-435

Trust: 0.8

title:Patch for Fortinet FortiSwitch Authorization Issue Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/698701

Trust: 0.6

sources: CNVD: CNVD-2025-12795 // JVNDB: JVNDB-2024-026440

EXTERNAL IDS

db:NVDid:CVE-2024-48887

Trust: 3.2

db:JVNDBid:JVNDB-2024-026440

Trust: 0.8

db:CNVDid:CNVD-2025-12795

Trust: 0.6

sources: CNVD: CNVD-2025-12795 // JVNDB: JVNDB-2024-026440 // NVD: CVE-2024-48887

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2024-48887

Trust: 1.4

url:https://fortiguard.fortinet.com/psirt/fg-ir-24-435

Trust: 1.0

sources: CNVD: CNVD-2025-12795 // JVNDB: JVNDB-2024-026440 // NVD: CVE-2024-48887

SOURCES

db:CNVDid:CNVD-2025-12795
db:JVNDBid:JVNDB-2024-026440
db:NVDid:CVE-2024-48887

LAST UPDATE DATE

2025-07-28T23:23:23.046000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-12795date:2025-06-18T00:00:00
db:JVNDBid:JVNDB-2024-026440date:2025-07-25T06:41:00
db:NVDid:CVE-2024-48887date:2025-07-23T16:03:34.897

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-12795date:2025-06-17T00:00:00
db:JVNDBid:JVNDB-2024-026440date:2025-07-25T00:00:00
db:NVDid:CVE-2024-48887date:2025-04-08T17:15:34.440