Cyber Posture

CVE-2024-35279

High

Published: 11 February 2025

Published
11 February 2025
Modified
17 July 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0196 83.6th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-35279 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Fortinet Fortios. Its CVSS base score is 8.1 (High).

Operationally, ranked in the top 16.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 CM-7 (Least Functionality) and SC-7 (Boundary Protection).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the stack-based buffer overflow vulnerability by applying vendor patches to affected FortiOS versions as specified in the advisory.

prevent

Minimizes attack surface by prohibiting or restricting the fabric service and CAPWAP on exposed interfaces when not essential.

prevent

Enforces boundary protection via firewall rules to block unauthorized crafted UDP packets from reaching the vulnerable CAPWAP control interface.

NVD Description

A stack-based buffer overflow [CWE-121] vulnerability in Fortinet FortiOS version 7.2.4 through 7.2.8 and version 7.4.0 through 7.4.4 allows a remote unauthenticated attacker to execute arbitrary code or commands via crafted UDP packets through the CAPWAP control, provided the attacker…

more

were able to evade FortiOS stack protections and provided the fabric service is running on the exposed interface.

Deeper analysisAI

CVE-2024-35279 is a stack-based buffer overflow vulnerability (CWE-121) affecting Fortinet FortiOS versions 7.2.4 through 7.2.8 and 7.4.0 through 7.4.4. The issue resides in the CAPWAP control mechanism and requires the fabric service to be running on an exposed interface. It has a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to potential high impacts on confidentiality, integrity, and availability.

A remote unauthenticated attacker can exploit this vulnerability by sending crafted UDP packets to the CAPWAP control interface. Successful exploitation allows execution of arbitrary code or commands, provided the attacker evades FortiOS stack protections. The attack vector is network-accessible with high complexity required and no user interaction or privileges needed.

The Fortinet product security incident response team advisory FG-IR-24-160, available at https://fortiguard.fortinet.com/psirt/FG-IR-24-160, details affected versions and recommended mitigations.

Details

CWE(s)

Affected Products

fortinet
fortios
7.2.4 — 7.2.9 · 7.4.0 — 7.4.5

CVEs Like This One

CVE-2026-22153Same product: Fortinet Fortios
CVE-2025-53847Same product: Fortinet Fortios
CVE-2024-40591Same product: Fortinet Fortios
CVE-2024-46668Same product: Fortinet Fortios
CVE-2025-64157Same product: Fortinet Fortios
CVE-2024-46670Same product: Fortinet Fortios
CVE-2024-26006Same product: Fortinet Fortios
CVE-2025-24472Same product: Fortinet Fortios
CVE-2024-55591Same product: Fortinet Fortios
CVE-2025-25249Same product: Fortinet Fortios

References