CVE-2024-33508
FortiClient EMS Analisi e mitigazione delle vulnerabilità

Panoramica

An improper neutralization of special elements used in a command (Command Injection) vulnerability was discovered in Fortinet FortiClientEMS affecting versions 7.2.0 through 7.2.4 and 7.0.0 through 7.0.12. The vulnerability was assigned CVE-2024-33508 and was disclosed on September 10, 2024. This security flaw impacts the DAS component of FortiClientEMS, including both standard and cloud deployments (Fortinet Advisory).

Dettagli tecnici

The vulnerability is classified as CWE-77 (Improper Neutralization of Special Elements used in a Command) with a CVSS v3.1 base score of 7.3 (HIGH). The attack vector is network-based (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N). The scope is unchanged (S:U) with low impacts on confidentiality (C:L), integrity (I:L), and availability (A:L) (NVD).

Impatto

The vulnerability allows an unauthenticated attacker to execute limited and temporary operations on the underlying database via crafted requests. The impact is rated as low across confidentiality, integrity, and availability aspects of the system (Fortinet Advisory).

Mitigazione e soluzioni alternative

Fortinet has released patches to address this vulnerability. Users of FortiClientEMS 7.2.x should upgrade to version 7.2.5 or above, while users of version 7.0.x should upgrade to 7.0.13 or above. For FortiSASE customers, Fortinet has remediated this issue in version 24.2.c with no action required from customers (Fortinet Advisory).

Reazioni della comunità

The vulnerability was responsibly disclosed by ANSSI to Fortinet, demonstrating effective coordination between security researchers and vendors (Fortinet Advisory).

Risorse aggiuntive


FonteQuesto report è stato generato utilizzando l'intelligenza artificiale

Imparentato FortiClient EMS Vulnerabilità:

CVE ID

Severità

Punteggio

Tecnologie

Nome del componente

Exploit CISA KEV

Ha la correzione

Data di pubblicazione

CVE-2026-35616CRITICAL9.8
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_enterprise_management_server
Apr 04, 2026
CVE-2026-21643CRITICAL9.8
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_endpoint_management_server
Feb 06, 2026
CVE-2023-48788CRITICAL9.8
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_endpoint_management_server
Mar 12, 2024
CVE-2024-33508HIGH7.3
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_enterprise_management_server
NoSep 10, 2024
CVE-2024-21753MEDIUM6
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_endpoint_management_server
NoSep 10, 2024

Valutazione gratuita delle vulnerabilità

Benchmark della tua posizione di sicurezza del cloud

Valuta le tue pratiche di sicurezza cloud in 9 domini di sicurezza per confrontare il tuo livello di rischio e identificare le lacune nelle tue difese.

Richiedi valutazione

Richiedi una demo personalizzata

Pronti a vedere Wiz in azione?

"La migliore esperienza utente che abbia mai visto offre piena visibilità ai carichi di lavoro cloud."
David EstlickCISO (CISO)
"Wiz fornisce un unico pannello di controllo per vedere cosa sta succedendo nei nostri ambienti cloud."
Adam FletcherResponsabile della sicurezza
"Sappiamo che se Wiz identifica qualcosa come critico, in realtà lo è."
Greg PoniatowskiResponsabile della gestione delle minacce e delle vulnerabilità