Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
Fortinet Security Updates (AL02/250212/CSIRT-ITA)

Fortinet Security Updates (AL02/250212/CSIRT-ITA)

Summary

New vulnerabilities have been discovered in multiple products, including four with a severity of “high.” These vulnerabilities could allow access to sensitive information, execution of arbitrary commands, and elevation of user privileges on affected systems.

Note: The vendor states that CVE-2025-24472 is being actively exploited online.

Risk

Vulnerability Community Impact Estimation: Critical (77.05)

Type

  • Arbitrary Code Execution
  • Information Disclosure
  • Privilege Escalation

Affected Products and Versions

  • FortiPortal 7.0.x, from version 7.0.0 to 7.0.11
  • FortiPortal 7.2.x, from version 7.2.0 to 7.2.6
  • FortiPortal 7.4.x, from version 7.4.0 to 7.4.2
  • FortiOS 6.4.x
  • FortiOS 7.0.x, from version 7.0.0 to 7.0.16
  • FortiOS 7.2.x, from version 7.2.0 to 7.2.9
  • FortiOS 7.4.x, from version 7.4.0 to 7.4.4
  • FortiOS 7.6.x
  • FortiProxy 7.0.x, from version 7.0.0 to 7.0.19
  • FortiProxy 7.2.x, from version 7.2.0 to 7.2.12

Mitigations

In line with vendor statements, it is recommended to apply mitigations following the guidance in the security bulletins available in the References section.

Finally, it is recommended to evaluate the implementation of the Indicators of Compromise (IoC)[1] reported in the security bulletins.

The following are the CVEs related to the vulnerabilities with a severity of “high”:

[1] By definition, not all indicators of compromise are malicious. This CSIRT has no responsibility for implementing any proactive actions (e.g. blocklisting IoCs) related to the indicators provided. The information contained in this document represents the best understanding of the threat at the time of release.

CVE
CVE-2024-35279
CVE-2024-40591
CVE-2025-24470
CVE-2025-24472

References

https://fortiguard.fortinet.com/psirt/FG-IR-24-302

https://fortiguard.fortinet.com/psirt/FG-IR-24-160

https://fortiguard.fortinet.com/psirt/FG-IR-24-535

https://fortiguard.fortinet.com/psirt/FG-IR-25-015

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of the affected software/devices in the reference community.

Recommended to you

Search in 365TRUST

Our services