CVE-2024-35276
Published: 14 January 2025
Summary
CVE-2024-35276 is a medium-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Fortinet Fortianalyzer. Its CVSS base score is 5.6 (Medium).
Operationally, ranked at the 37.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Applying Fortinet patches directly remediates the stack-based buffer overflow vulnerability across affected FortiAnalyzer and FortiManager versions.
Stack canaries, ASLR, and DEP implementations protect against exploitation of the stack buffer overflow for unauthorized code execution.
Validating incoming packet lengths and contents prevents specially crafted packets from overflowing the stack buffer.
NVD Description
A stack-based buffer overflow in Fortinet FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager Cloud versions 7.4.1 through 7.4.3,…
more
7.2.1 through 7.2.5, 7.0.1 through 7.0.11, 6.4.1 through 6.4.7, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, 6.4.1 through 6.4.7 allows attacker to execute unauthorized code or commands via specially crafted packets.
Deeper analysisAI
CVE-2024-35276 is a stack-based buffer overflow vulnerability (CWE-121, CWE-787) affecting multiple Fortinet products, including FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, and 6.4.0 through 6.4.14; FortiManager versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, and 6.4.0 through 6.4.14; FortiManager Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, and 6.4.1 through 6.4.7; and FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, and 6.4.1 through 6.4.7. The vulnerability, published on January 14, 2025, has a CVSS v3.1 base score of 5.6 (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).
A remote, unauthenticated attacker can exploit this vulnerability by sending specially crafted packets to the affected devices, potentially leading to execution of unauthorized code or commands. The high attack complexity (AC:H) limits feasibility, but successful exploitation could result in low-level impacts: limited confidentiality, integrity, and availability effects without scope change.
Fortinet's advisory (FG-IR-24-165) at https://fortiguard.fortinet.com/psirt/FG-IR-24-165 provides details on affected versions and recommended mitigations, including available patches for upgrading to fixed releases. Security practitioners should review the advisory for version-specific remediation steps.
Details
- CWE(s)