Cyber Posture

CVE-2024-35276

Medium

Published: 14 January 2025

Published
14 January 2025
Modified
31 January 2025
KEV Added
Patch
CVSS Score 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0017 37.3th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-35276 is a medium-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Fortinet Fortianalyzer. Its CVSS base score is 5.6 (Medium).

Operationally, ranked at the 37.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Applying Fortinet patches directly remediates the stack-based buffer overflow vulnerability across affected FortiAnalyzer and FortiManager versions.

prevent

Stack canaries, ASLR, and DEP implementations protect against exploitation of the stack buffer overflow for unauthorized code execution.

prevent

Validating incoming packet lengths and contents prevents specially crafted packets from overflowing the stack buffer.

NVD Description

A stack-based buffer overflow in Fortinet FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager Cloud versions 7.4.1 through 7.4.3,…

more

7.2.1 through 7.2.5, 7.0.1 through 7.0.11, 6.4.1 through 6.4.7, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, 6.4.1 through 6.4.7 allows attacker to execute unauthorized code or commands via specially crafted packets.

Deeper analysisAI

CVE-2024-35276 is a stack-based buffer overflow vulnerability (CWE-121, CWE-787) affecting multiple Fortinet products, including FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, and 6.4.0 through 6.4.14; FortiManager versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, and 6.4.0 through 6.4.14; FortiManager Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, and 6.4.1 through 6.4.7; and FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, 7.2.1 through 7.2.5, 7.0.1 through 7.0.11, and 6.4.1 through 6.4.7. The vulnerability, published on January 14, 2025, has a CVSS v3.1 base score of 5.6 (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).

A remote, unauthenticated attacker can exploit this vulnerability by sending specially crafted packets to the affected devices, potentially leading to execution of unauthorized code or commands. The high attack complexity (AC:H) limits feasibility, but successful exploitation could result in low-level impacts: limited confidentiality, integrity, and availability effects without scope change.

Fortinet's advisory (FG-IR-24-165) at https://fortiguard.fortinet.com/psirt/FG-IR-24-165 provides details on affected versions and recommended mitigations, including available patches for upgrading to fixed releases. Security practitioners should review the advisory for version-specific remediation steps.

Details

CWE(s)

Affected Products

fortinet
fortianalyzer
6.4.0 — 6.4.15 · 7.0.0 — 7.0.13 · 7.2.0 — 7.2.6
fortinet
fortianalyzer cloud
6.4.1 — 7.0.12 · 7.2.1 — 7.2.6 · 7.4.1 — 7.4.4
fortinet
fortimanager
6.4.0 — 6.4.15 · 7.0.0 — 7.0.13 · 7.2.0 — 7.2.6
fortinet
fortimanager cloud
6.4.1 — 7.0.12 · 7.2.1 — 7.2.6 · 7.4.1 — 7.4.4

CVEs Like This One

CVE-2024-35273Same product: Fortinet Fortianalyzer
CVE-2024-35275Same product: Fortinet Fortianalyzer
CVE-2024-50563Same product: Fortinet Fortianalyzer
CVE-2024-33503Same product: Fortinet Fortianalyzer
CVE-2025-68648Same product: Fortinet Fortianalyzer
CVE-2025-61848Same product: Fortinet Fortianalyzer
CVE-2025-48418Same product: Fortinet Fortianalyzer
CVE-2024-45331Same product: Fortinet Fortianalyzer
CVE-2024-40584Same product: Fortinet Fortianalyzer
CVE-2026-22572Same product: Fortinet Fortianalyzer

References