CVE-2024-50567
Published: 11 February 2025
Summary
CVE-2024-50567 is a high-severity OS Command Injection (CWE-78) vulnerability in Fortinet Fortiweb. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 35.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires information input validation mechanisms at input points to neutralize special elements and prevent OS command injection via crafted input.
Mandates timely identification, reporting, and remediation of flaws like this OS command injection vulnerability through patching affected FortiWeb versions.
Enforces least privilege to limit the scope and impact of unauthorized command execution even by high-privilege attackers exploiting the vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection in public-facing FortiWeb web app directly enables remote arbitrary command execution via crafted input (T1190) using Unix shell (T1059.004).
NVD Description
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWeb 7.4.0 through 7.6.0 allows attacker to execute unauthorized code or commands via crafted input.
Deeper analysisAI
CVE-2024-50567 is an OS command injection vulnerability (CWE-78) in Fortinet FortiWeb versions 7.4.0 through 7.6.0. The flaw arises from improper neutralization of special elements used in an OS command, enabling attackers to execute unauthorized code or commands through crafted input. Published on 2025-02-11, it carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
An attacker with high privileges can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation allows execution of arbitrary OS commands, resulting in high impacts to confidentiality, integrity, and availability.
Fortinet's PSIRT advisory FG-IR-24-438 at https://fortiguard.fortinet.com/psirt/FG-IR-24-438 provides further details on the vulnerability and mitigation steps.
Details
- CWE(s)