Cyber Posture

CVE-2024-36512

High

Published: 14 January 2025

Published
14 January 2025
Modified
31 January 2025
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0066 71.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-36512 is a high-severity Path Traversal (CWE-22) vulnerability in Fortinet Fortianalyzer. Its CVSS base score is 7.2 (High).

Operationally, ranked in the top 28.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the path traversal vulnerability by requiring timely testing and deployment of vendor patches for affected FortiManager and FortiAnalyzer versions.

prevent

Validates pathnames in crafted HTTP/HTTPS requests to prevent traversal beyond restricted directories and unauthorized code execution.

prevent

Limits high-privilege access required for exploitation (PR:H), reducing the number of accounts able to send crafted requests.

NVD Description

An improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiManager, FortiAnalyzer 7.4.0 through 7.4.3 and 7.2.0 through 7.2.5 and 7.0.2 through 7.0.12 and 6.2.10 through 6.2.13 allows attacker to execute unauthorized code or commands via…

more

crafted HTTP or HTTPS requests.

Deeper analysisAI

CVE-2024-36512 is a path traversal vulnerability (CWE-22) affecting Fortinet FortiManager and FortiAnalyzer in versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.2 through 7.0.12, and 6.2.10 through 6.2.13. The issue arises from an improper limitation of a pathname to a restricted directory, which allows remote attackers to execute unauthorized code or commands by sending crafted HTTP or HTTPS requests. Published on January 14, 2025, it carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), rated as High severity.

An attacker with high privileges, such as an authenticated administrator, can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, enabling arbitrary code execution on the affected system and potential full compromise of the FortiManager or FortiAnalyzer instance.

The Fortinet PSIRT advisory FG-IR-24-152 provides details on mitigation strategies and patches; security practitioners should consult https://fortiguard.fortinet.com/psirt/FG-IR-24-152 for upgrade instructions and workarounds applicable to vulnerable versions.

Details

CWE(s)

Affected Products

fortinet
fortianalyzer
6.2.10 — 7.0.13 · 7.2.0 — 7.2.6 · 7.4.0 — 7.4.4
fortinet
fortimanager
6.2.10 — 7.0.13 · 7.2.0 — 7.2.6 · 7.4.0 — 7.4.4

CVEs Like This One

CVE-2024-33502Same product: Fortinet Fortianalyzer
CVE-2026-22572Same product: Fortinet Fortianalyzer
CVE-2024-48884Same product: Fortinet Fortimanager
CVE-2024-48885Same vendor: Fortinet
CVE-2025-48418Same product: Fortinet Fortianalyzer
CVE-2024-35276Same product: Fortinet Fortianalyzer
CVE-2025-68648Same product: Fortinet Fortianalyzer
CVE-2025-54820Same product: Fortinet Fortimanager
CVE-2025-61848Same product: Fortinet Fortianalyzer
CVE-2024-47571Same product: Fortinet Fortimanager

References