CVE-2024-21753
FortiClient EMS Análisis y mitigación de vulnerabilidades

Vista general

A path traversal vulnerability (CVE-2024-21753) was discovered in Fortinet FortiClientEMS management interface affecting versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.13, 6.4.0 through 6.4.9, 6.2.0 through 6.2.9, 6.0.0 through 6.0.8, and 1.2.1 through 1.2.5. The vulnerability was internally discovered by Gwendal Guégniaud of Fortinet Product Security Team and publicly disclosed on September 10, 2024 (Fortinet Advisory).

Técnicas

The vulnerability is classified as an improper limitation of a pathname to a restricted directory (CWE-22) that exists in the FortiClientEMS management interface. The issue allows authenticated attackers to perform unauthorized file operations through specially crafted HTTP requests. The vulnerability has received a CVSS v3.1 base score of 6.0 (Medium) from NIST with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H, while Fortinet assigned it a slightly lower score of 5.5 (Medium) (NVD).

Impacto

The exploitation of this vulnerability can lead to multiple security impacts including denial of service, unauthorized file reading, and the ability to write a limited number of files to the system via specially crafted HTTP requests. This could potentially compromise system integrity and availability (Rapid7).

Mitigación y soluciones alternativas

Fortinet has released security patches to address this vulnerability. Users are advised to upgrade to FortiClientEMS version 7.2.5 or above. For older versions, users should migrate to a fixed release as soon as possible. Specifically, users running versions 7.0.x through 7.0.13, 6.4.x through 6.4.9, 6.2.x through 6.2.9, 6.0.x through 6.0.8, and 1.2.x through 1.2.5 should upgrade to a supported version (Fortinet Advisory).

Recursos adicionales


FuenteEste informe se generó utilizando IA

Relacionado FortiClient EMS Vulnerabilidades:

CVE ID

Severidad

Puntuación

Tecnologías

Nombre del componente

Exploit de CISA KEV

Tiene arreglo

Fecha de publicación

CVE-2026-35616CRITICAL9.8
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_enterprise_management_server
Apr 04, 2026
CVE-2026-21643CRITICAL9.8
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_endpoint_management_server
Feb 06, 2026
CVE-2023-48788CRITICAL9.8
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_endpoint_management_server
Mar 12, 2024
CVE-2024-33508HIGH7.3
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_enterprise_management_server
NoSep 10, 2024
CVE-2024-21753MEDIUM6
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_endpoint_management_server
NoSep 10, 2024

Evaluación gratuita de vulnerabilidades

Compare su postura de seguridad en la nube

Evalúe sus prácticas de seguridad en la nube en 9 dominios de seguridad para comparar su nivel de riesgo e identificar brechas en sus defensas.

Solicitar evaluación

Recursos adicionales de Wiz

Obtén una demostración personalizada

¿Listo para ver a Wiz en acción?

"La mejor experiencia de usuario que he visto en mi vida, proporciona una visibilidad completa de las cargas de trabajo en la nube."
David EstlickCISO
"Wiz proporciona un panel único para ver lo que ocurre en nuestros entornos en la nube."
Adam FletcherJefe de Seguridad
"Sabemos que si Wiz identifica algo como crítico, en realidad lo es."
Greg PoniatowskiJefe de Gestión de Amenazas y Vulnerabilidades