Cyber Posture

CVE-2024-46670

High

Published: 14 January 2025

Published
14 January 2025
Modified
31 January 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0152 81.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-46670 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Fortinet Fortios. Its CVSS base score is 7.5 (High).

Operationally, ranked in the top 18.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation directly addresses the out-of-bounds read vulnerability in the IPsec IKE service by requiring timely patching of affected FortiOS versions to prevent memory exhaustion DoS.

prevent

Denial-of-service protection implements mechanisms to limit effects of resource exhaustion attacks like those triggered by crafted IKE requests causing memory consumption.

prevent

Information input validation ensures crafted IKE requests are checked for validity, mitigating the risk of out-of-bounds reads leading to memory consumption.

NVD Description

An Out-of-bounds Read vulnerability [CWE-125] in FortiOS version 7.6.0, version 7.4.4 and below, version 7.2.9 and below and FortiSASE FortiOS tenant version 24.3.b IPsec IKE service may allow an unauthenticated remote attacker to trigger memory consumption leading to Denial of…

more

Service via crafted requests.

Deeper analysisAI

CVE-2024-46670 is an out-of-bounds read vulnerability (CWE-125) in the IPsec IKE service of FortiOS version 7.6.0, version 7.4.4 and below, version 7.2.9 and below, and FortiSASE FortiOS tenant version 24.3.b. The flaw enables an unauthenticated remote attacker to trigger memory consumption, potentially leading to a denial-of-service condition via crafted requests.

The vulnerability can be exploited by any unauthenticated attacker with network access to the affected IPsec IKE service, requiring low attack complexity and no user interaction. Exploitation achieves high-impact denial of service through memory exhaustion, with no impact on confidentiality or integrity, as reflected in its CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

Mitigation details are provided in the FortiGuard PSIRT advisory at https://fortiguard.fortinet.com/psirt/FG-IR-24-266.

Details

CWE(s)

Affected Products

fortinet
fortios
7.6.0 · 7.2.0 — 7.2.10 · 7.4.0 — 7.4.5

CVEs Like This One

CVE-2026-22153Same product: Fortinet Fortios
CVE-2025-53847Same product: Fortinet Fortios
CVE-2024-40591Same product: Fortinet Fortios
CVE-2024-46668Same product: Fortinet Fortios
CVE-2025-64157Same product: Fortinet Fortios
CVE-2024-35279Same product: Fortinet Fortios
CVE-2024-26006Same product: Fortinet Fortios
CVE-2025-24472Same product: Fortinet Fortios
CVE-2024-55591Same product: Fortinet Fortios
CVE-2025-25249Same product: Fortinet Fortios

References