Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Critical Flaw in FortiManager Under Attack

October 24, 2024
Reading Time: 2 mins read
in Alerts
Critical Flaw in FortiManager Under Attack

Fortinet has raised alarms over a critical vulnerability in its FortiManager platform, identified as CVE-2024-47575, which has already come under active exploitation. With a CVSS score of 9.8, this flaw, dubbed “FortiJump,” is linked to a missing authentication issue in the FortiGate to FortiManager (FGFM) protocol. This security lapse could enable remote, unauthenticated attackers to execute arbitrary code or commands by sending specially crafted requests. The vulnerability impacts FortiManager versions 7.x and 6.x, as well as several older FortiAnalyzer models, highlighting a significant risk for organizations relying on these systems for network management.

In response to the severity of the situation, Fortinet has provided several mitigation strategies tailored to different versions of FortiManager. For users of versions 7.0.12 or higher, Fortinet recommends preventing unknown devices from attempting to register with the system. Those running versions 7.2.0 and above should establish local-in policies to allow connections only from specified IP addresses. Additionally, users with versions 7.2.2, 7.4.0, and 7.6.0 or higher are advised to utilize custom certificates to enhance security against potential exploitation.

The active exploitation of this vulnerability has raised concerns among cybersecurity experts, particularly as attackers have reportedly used scripts to automate the exfiltration of sensitive files from compromised FortiManager systems. These files could contain crucial information, such as IP addresses, credentials, and configurations of managed devices. However, Fortinet has clarified that the exploitation has not yet been weaponized to deploy malware or backdoors, nor has there been any evidence of altered databases or connections within the affected systems.

Given the urgency of the matter, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has included CVE-2024-47575 in its Known Exploited Vulnerabilities catalog, mandating that federal agencies implement the necessary fixes by November 13, 2024. Fortinet emphasizes the importance of swift action, urging customers to follow the provided guidance to bolster their security posture. The company continues to collaborate with international government agencies and industry threat organizations to address this vulnerability and protect users from potential attacks.

Reference:
  • Missing authentication in fgfmsd
Tags: Cyber AlertsCyber Alerts 2024Cyber threatsFortiManagerFortinetOctober 2024Vulnerabilities
ADVERTISEMENT

Related Posts

VexTrio TDS Uses Adtech To Spread Malware

Simple Typo Breaks AI Safety Via TokenBreak

June 13, 2025
VexTrio TDS Uses Adtech To Spread Malware

VexTrio TDS Uses Adtech To Spread Malware

June 13, 2025
VexTrio TDS Uses Adtech To Spread Malware

Old Discord Links Now Lead To Malware

June 13, 2025
SmartAttack Uses Sound To Steal PC Data

SmartAttack Uses Sound To Steal PC Data

June 13, 2025
SmartAttack Uses Sound To Steal PC Data

Coordinated Brute Force Hits Tomcat Manager

June 13, 2025
SmartAttack Uses Sound To Steal PC Data

Pentest Tool TeamFiltration Hits Entra ID

June 12, 2025

Latest Alerts

Old Discord Links Now Lead To Malware

VexTrio TDS Uses Adtech To Spread Malware

Simple Typo Breaks AI Safety Via TokenBreak

Coordinated Brute Force Hits Tomcat Manager

SmartAttack Uses Sound To Steal PC Data

Pentest Tool TeamFiltration Hits Entra ID

Subscribe to our newsletter

    Latest Incidents

    Cyberattack On Brussels Parliament Continues

    Swedish Broadcaster SVT Hit By DDoS

    Major Google Cloud Outage Disrupts Web

    AI Spam Hijacks Official US Vaccine Site

    DragonForce Ransomware Hits Philly Schools

    Erie Insurance Cyberattack Halts Operations

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial