Cyber Posture

CVE-2024-52968

Medium

Published: 11 February 2025

Published
11 February 2025
Modified
16 July 2025
KEV Added
Patch
CVSS Score 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 7.7th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-52968 is a medium-severity Improper Authentication (CWE-287) vulnerability in Fortinet Forticlient. Its CVSS base score is 6.7 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 7.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the improper authentication flaw in FortiClientMac by identifying, reporting, and applying vendor-recommended patches as per the Fortinet advisory.

prevent

Requires secure management of authenticators to prohibit empty or default passwords, directly preventing exploitation of the empty password mechanism.

prevent

Enforces least privilege to limit high-privilege (PR:H) access required for local exploitation, reducing the attack surface for privileged users.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1078.003 Local Accounts Stealth
Adversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

Local auth bypass via empty password in FortiClientMac enables privilege escalation to full macOS compromise (T1068) and abuse of local accounts with weak/empty credentials (T1078.003).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

An improper authentication in Fortinet FortiClientMac 7.0.11 through 7.2.4 allows attacker to gain improper access to MacOS via empty password.

Deeper analysisAI

CVE-2024-52968 is an improper authentication vulnerability (CWE-287) affecting Fortinet FortiClientMac in versions 7.0.11 through 7.2.4. It enables an attacker to gain unauthorized access to macOS by exploiting an empty password mechanism. The vulnerability carries a CVSS v3.1 base score of 6.7 (AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating medium severity with high impacts on confidentiality, integrity, and availability.

Exploitation requires local access to the system and high privileges (PR:H), such as those held by an administrator or privileged user. A successful attack allows the adversary to bypass authentication controls, potentially leading to full compromise of the macOS environment through improper access granted via the empty password flaw. No user interaction is needed, and the low attack complexity makes it feasible for a privileged local attacker.

Fortinet's advisory (FG-IR-24-300) at https://fortiguard.fortinet.com/psirt/FG-IR-24-300 provides details on mitigation, including recommended patches and workarounds for affected FortiClientMac versions. Security practitioners should consult this reference for version-specific remediation steps.

Details

CWE(s)

Affected Products

fortinet
forticlient
7.4.0 · 7.0.11 — 7.0.13 · 7.2.3 — 7.2.5

CVEs Like This One

CVE-2025-62676Same product: Fortinet Forticlient
CVE-2026-24018Same product: Fortinet Forticlient
CVE-2023-45588Same product: Fortinet Forticlient
CVE-2025-64157Same product class: VPN / SSL gateway
CVE-2020-9295Same product: Fortinet Forticlient
CVE-2024-26006Same product class: VPN / SSL gateway
CVE-2024-48884Same product class: VPN / SSL gateway
CVE-2025-24472Same product class: VPN / SSL gateway
CVE-2026-22153Same product class: VPN / SSL gateway
CVE-2024-48886Same product class: VPN / SSL gateway

References