CVE-2024-46662
Published: 14 March 2025
Summary
CVE-2024-46662 is a high-severity Command Injection (CWE-77) vulnerability in Fortinet Fortimanager. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 46.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses command injection by requiring validation mechanisms to neutralize special elements in inputs like crafted packets.
Ensures timely remediation of the specific command injection flaw through identification, reporting, and patching of affected FortiManager versions.
Limits the impact of privilege escalation by enforcing least privilege, restricting low-privileged attackers from gaining higher access even if injection succeeds.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection vulnerability in FortiManager directly enables privilege escalation from low-privileged access over the network.
NVD Description
A improper neutralization of special elements used in a command ('command injection') in Fortinet FortiManager versions 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3 allows attacker to escalation of privilege via specifically crafted packets
Deeper analysisAI
CVE-2024-46662 is a command injection vulnerability (CWE-77), resulting from improper neutralization of special elements used in a command, affecting Fortinet FortiManager versions 7.4.1 through 7.4.3 and FortiManager Cloud versions 7.4.1 through 7.4.3. The issue, published on 2025-03-14T15:15:43.200, carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and enables privilege escalation via specifically crafted packets.
An attacker requires low privileges (PR:L) to exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation allows the attacker to achieve high impacts on confidentiality, integrity, and availability (C:I:A:H), specifically through privilege escalation.
The Fortinet advisory FG-IR-24-222 at https://fortiguard.fortinet.com/psirt/FG-IR-24-222 provides details on mitigation and patching recommendations for affected versions.
Details
- CWE(s)