Cyber Posture

CVE-2024-46662

HighRCE

Published: 14 March 2025

Published
14 March 2025
Modified
24 July 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0030 53.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-46662 is a high-severity Command Injection (CWE-77) vulnerability in Fortinet Fortimanager. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 46.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses command injection by requiring validation mechanisms to neutralize special elements in inputs like crafted packets.

prevent

Ensures timely remediation of the specific command injection flaw through identification, reporting, and patching of affected FortiManager versions.

prevent

Limits the impact of privilege escalation by enforcing least privilege, restricting low-privileged attackers from gaining higher access even if injection succeeds.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Command injection vulnerability in FortiManager directly enables privilege escalation from low-privileged access over the network.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A improper neutralization of special elements used in a command ('command injection') in Fortinet FortiManager versions 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3 allows attacker to escalation of privilege via specifically crafted packets

Deeper analysisAI

CVE-2024-46662 is a command injection vulnerability (CWE-77), resulting from improper neutralization of special elements used in a command, affecting Fortinet FortiManager versions 7.4.1 through 7.4.3 and FortiManager Cloud versions 7.4.1 through 7.4.3. The issue, published on 2025-03-14T15:15:43.200, carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and enables privilege escalation via specifically crafted packets.

An attacker requires low privileges (PR:L) to exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation allows the attacker to achieve high impacts on confidentiality, integrity, and availability (C:I:A:H), specifically through privilege escalation.

The Fortinet advisory FG-IR-24-222 at https://fortiguard.fortinet.com/psirt/FG-IR-24-222 provides details on mitigation and patching recommendations for affected versions.

Details

CWE(s)

Affected Products

fortinet
fortimanager
7.4.1 — 7.4.4
fortinet
fortimanager cloud
7.4.1 — 7.4.4

CVEs Like This One

CVE-2024-33504Same product: Fortinet Fortimanager
CVE-2025-48418Same product: Fortinet Fortimanager
CVE-2024-35277Same product: Fortinet Fortimanager
CVE-2025-68648Same product: Fortinet Fortimanager
CVE-2024-50566Same product: Fortinet Fortimanager
CVE-2026-22572Same product: Fortinet Fortimanager
CVE-2024-48885Same vendor: Fortinet
CVE-2024-35276Same product: Fortinet Fortimanager
CVE-2025-54820Same product: Fortinet Fortimanager
CVE-2025-61848Same product: Fortinet Fortimanager

References