CVE-2024-21753
FortiClient EMS Análise e mitigação de vulnerabilidades

Visão geral

A path traversal vulnerability (CVE-2024-21753) was discovered in Fortinet FortiClientEMS management interface affecting versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.13, 6.4.0 through 6.4.9, 6.2.0 through 6.2.9, 6.0.0 through 6.0.8, and 1.2.1 through 1.2.5. The vulnerability was internally discovered by Gwendal Guégniaud of Fortinet Product Security Team and publicly disclosed on September 10, 2024 (Fortinet Advisory).

Detalhes técnicos

The vulnerability is classified as an improper limitation of a pathname to a restricted directory (CWE-22) that exists in the FortiClientEMS management interface. The issue allows authenticated attackers to perform unauthorized file operations through specially crafted HTTP requests. The vulnerability has received a CVSS v3.1 base score of 6.0 (Medium) from NIST with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H, while Fortinet assigned it a slightly lower score of 5.5 (Medium) (NVD).

Impacto

The exploitation of this vulnerability can lead to multiple security impacts including denial of service, unauthorized file reading, and the ability to write a limited number of files to the system via specially crafted HTTP requests. This could potentially compromise system integrity and availability (Rapid7).

Mitigação e soluções alternativas

Fortinet has released security patches to address this vulnerability. Users are advised to upgrade to FortiClientEMS version 7.2.5 or above. For older versions, users should migrate to a fixed release as soon as possible. Specifically, users running versions 7.0.x through 7.0.13, 6.4.x through 6.4.9, 6.2.x through 6.2.9, 6.0.x through 6.0.8, and 1.2.x through 1.2.5 should upgrade to a supported version (Fortinet Advisory).

Recursos adicionais


OrigemEste relatório foi gerado usando IA

Relacionado FortiClient EMS Vulnerabilidades:

CVE ID

Gravidade

Pontuação

Tecnologias

Nome do componente

Exploração do CISA KEV

Tem correção

Data de publicação

CVE-2026-35616CRITICAL9.8
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_enterprise_management_server
SimSimApr 04, 2026
CVE-2026-21643CRITICAL9.8
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_endpoint_management_server
SimSimFeb 06, 2026
CVE-2023-48788CRITICAL9.8
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_enterprise_management_server
SimSimMar 12, 2024
CVE-2024-33508HIGH7.3
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_enterprise_management_server
NãoSimSep 10, 2024
CVE-2024-21753MEDIUM6
  • FortiClient EMSFortiClient EMS
  • cpe:2.3:a:fortinet:forticlient_endpoint_management_server
NãoSimSep 10, 2024

Avaliação de vulnerabilidade gratuita

Compare sua postura de segurança na nuvem

Avalie suas práticas de segurança na nuvem em 9 domínios de segurança para comparar seu nível de risco e identificar lacunas em suas defesas.

Solicitar avaliação

Marque uma demonstração personalizada

Pronto para ver a Wiz em ação?

"A melhor experiência do usuário que eu já vi, fornece visibilidade total para cargas de trabalho na nuvem."
David EstlickCISO
"A Wiz fornece um único painel de vidro para ver o que está acontecendo em nossos ambientes de nuvem."
Adão FletcherDiretor de Segurança
"Sabemos que se a Wiz identifica algo como crítico, na verdade é."
Greg PoniatowskiChefe de Gerenciamento de Ameaças e Vulnerabilidades