CVE-2024-45324
Published: 11 March 2025
Summary
CVE-2024-45324 is a high-severity Use of Externally-Controlled Format String (CWE-134) vulnerability in Fortinet Fortios. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 44.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the format string vulnerability by applying vendor patches for affected Fortinet products as specified in the advisory.
Validates externally-controlled inputs in HTTP/HTTPS commands to block specially crafted format strings from reaching vulnerable parsing functions.
Provides memory protections such as ASLR and DEP to mitigate arbitrary code execution even if a format string vulnerability is exploited.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a network-accessible RCE vulnerability in public-facing Fortinet web management interfaces (HTTP/HTTPS), directly enabling exploitation of public-facing applications for code/command execution.
NVD Description
A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.0 through 7.4.4, version 7.2.0 through 7.2.9, version 7.0.0 through 7.0.15 and before 6.4.15, FortiProxy version 7.4.0 through 7.4.6, version 7.2.0 through 7.2.12 and before 7.0.19, FortiPAM version 1.4.0…
more
through 1.4.2 and before 1.3.1, FortiSRA version 1.4.0 through 1.4.2 and before 1.3.1 and FortiWeb version 7.4.0 through 7.4.5, version 7.2.0 through 7.2.10 and before 7.0.10 allows a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands.
Deeper analysisAI
CVE-2024-45324 is a use of externally-controlled format string vulnerability (CWE-134) affecting multiple Fortinet products. It impacts FortiOS versions 7.4.0 through 7.4.4, 7.2.0 through 7.2.9, 7.0.0 through 7.0.15 and before 6.4.15; FortiProxy versions 7.4.0 through 7.4.6, 7.2.0 through 7.2.12 and before 7.0.19; FortiPAM versions 1.4.0 through 1.4.2 and before 1.3.1; FortiSRA versions 1.4.0 through 1.4.2 and before 1.3.1; and FortiWeb versions 7.4.0 through 7.4.5, 7.2.0 through 7.2.10 and before 7.0.10.
The vulnerability can be exploited by a privileged attacker with high privileges (PR:H) over the network (AV:N) using low-complexity attacks (AC:L) that require no user interaction (UI:N). By sending specially crafted HTTP or HTTPS commands, the attacker can execute unauthorized code or commands, resulting in high impacts to confidentiality, integrity, and availability (CVSS 7.2; CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
Fortinet's PSIRT advisory FG-IR-24-325 (https://fortiguard.fortinet.com/psirt/FG-IR-24-325) provides details on mitigation and patches for the affected versions.
Details
- CWE(s)