CVE-2024-26009

An authentication bypass using an alternate path or channel [CWE-288] vulnerability in Fortinet FortiOS 6.4.0 through 6.4.15, FortiOS 6.2.0 through 6.2.16, FortiOS 6.0 all versions, FortiPAM 1.2.0, FortiPAM 1.1.0 through 1.1.2, FortiPAM 1.0.0 through 1.0.3, FortiProxy 7.4.0 through 7.4.2, FortiProxy 7.2.0 through 7.2.8, FortiProxy 7.0.0 through 7.0.15, FortiSwitchManager 7.2.0 through 7.2.3, FortiSwitchManager 7.0.0 through 7.0.3 allows an unauthenticated attacker to seize control of a managed device via crafted FGFM requests, if the device is managed by a FortiManager, and if the attacker knows that FortiManager's serial number.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*

History

20 Apr 2026, 09:16

Type Values Removed Values Added
Summary (en) An authentication bypass using an alternate path or channel [CWE-288] vulnerability in Fortinet FortiOS version 6.4.0 through 6.4.15 and before 6.2.16, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8 and before 7.0.15 & FortiPAM before version 1.2.0 allows an unauthenticated attacker to seize control of a managed device via crafted FGFM requests, if the device is managed by a FortiManager, and if the attacker knows that FortiManager's serial number. (en) An authentication bypass using an alternate path or channel [CWE-288] vulnerability in Fortinet FortiOS 6.4.0 through 6.4.15, FortiOS 6.2.0 through 6.2.16, FortiOS 6.0 all versions, FortiPAM 1.2.0, FortiPAM 1.1.0 through 1.1.2, FortiPAM 1.0.0 through 1.0.3, FortiProxy 7.4.0 through 7.4.2, FortiProxy 7.2.0 through 7.2.8, FortiProxy 7.0.0 through 7.0.15, FortiSwitchManager 7.2.0 through 7.2.3, FortiSwitchManager 7.0.0 through 7.0.3 allows an unauthenticated attacker to seize control of a managed device via crafted FGFM requests, if the device is managed by a FortiManager, and if the attacker knows that FortiManager's serial number.

14 Aug 2025, 01:13

Type Values Removed Values Added
CPE cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
References () https://fortiguard.fortinet.com/psirt/FG-IR-24-042 - () https://fortiguard.fortinet.com/psirt/FG-IR-24-042 - Vendor Advisory
First Time Fortinet fortipam
Fortinet
Fortinet fortiproxy
Fortinet fortios
Fortinet fortiswitchmanager

13 Aug 2025, 17:33

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de omisión de autenticación mediante una ruta o canal alternativo [CWE-288] en Fortinet FortiOS versión 6.4.0 a 6.4.15 y anteriores a 6.2.16, FortiProxy versión 7.4.0 a 7.4.2, 7.2.0 a 7.2.8 y anteriores a 7.0.15 y FortiPAM anterior a la versión 1.2.0 permite a un atacante no autenticado tomar el control de un dispositivo administrado a través de solicitudes FGFM manipuladas, si el dispositivo es administrado por un FortiManager y si el atacante conoce el número de serie de ese FortiManager.

12 Aug 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-12 19:15

Updated : 2026-04-20 09:16


NVD link : CVE-2024-26009

Mitre link : CVE-2024-26009

CVE.ORG link : CVE-2024-26009


JSON object : View

Products Affected

fortinet

  • fortiswitchmanager
  • fortiproxy
  • fortipam
  • fortios
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel