MEDIUMCVE-2024-45331CVSS 6.9

A incorrect privilege assignment in Fortinet FortiAnalyzer versions 7.4.0 through 7.4.3, 7.2.0 through 7.2.5, 7.0.0 through 7.0.13, 6.4.0 through 6.4.15, FortiManager versions 7.4.0 through 7.4.2, 7.2

अनुवाद हो रहा है…

प्लेटफ़ॉर्म

fortinet

घटक

fortianalyzer-fortimanager

में ठीक किया गया

7.4.4

7.2.6

7.0.14

6.4.16

7.4.3

7.2.6

7.0.14

6.4.16

AI Confidence: highNVDEPSS 0.2%समीक्षित: मई 2026
आपकी भाषा में अनुवाद हो रहा है…

CVE-2024-45331 is a privilege escalation vulnerability affecting Fortinet FortiAnalyzer and FortiManager devices. An incorrect privilege assignment allows an attacker to execute specific shell commands and gain elevated privileges within the system. Successful exploitation could lead to unauthorized access to sensitive data and control over the affected device, potentially impacting the entire network. This vulnerability impacts FortiAnalyzer versions 6.4.0 through 7.4.3, FortiManager versions 6.4.0 through 7.4.2, and related cloud versions. A fix is available in version 7.4.4.

प्रभाव और हमले की स्थितियाँअनुवाद हो रहा है…

The impact of CVE-2024-45331 is significant due to the potential for complete system compromise. An attacker who successfully exploits this vulnerability can gain administrative access to the FortiAnalyzer or FortiManager device. This elevated access allows them to modify configurations, access sensitive data such as logs and security policies, and potentially pivot to other systems on the network. The blast radius extends beyond the affected device, as an attacker could use it as a launchpad for further attacks. The ability to execute arbitrary shell commands is a critical security risk, similar to vulnerabilities that allow for remote code execution. Compromise of the FortiAnalyzer or FortiManager could lead to data breaches, denial of service, and disruption of security operations.

शोषण संदर्भअनुवाद हो रहा है…

CVE-2024-45331 was published on January 16, 2025. The vulnerability's EPSS score is currently pending evaluation, but the ability to escalate privileges via shell commands suggests a potential for active exploitation. Public proof-of-concept (POC) code may emerge, increasing the risk. Monitor security advisories and threat intelligence feeds for updates on exploitation activity. Refer to the Fortinet security advisory for detailed information and mitigation guidance.

खतरा खुफिया

एक्सप्लॉइट स्थिति

प्रूफ ऑफ कॉन्सेप्टअज्ञात
CISA KEVNO
इंटरनेट एक्सपोज़रनिम्न

EPSS

0.18% (39% शतमक)

CISA SSVC

शोषणnone
स्वचालनीयno
तकनीकी प्रभावtotal

CVSS वेक्टर

खतरा इंटेलिजेंस· CVSS 3.1CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C6.9MEDIUMAttack VectorLocalहमलावर लक्ष्य तक कैसे पहुंचता हैAttack ComplexityLowशोषण के लिए आवश्यक शर्तेंPrivileges RequiredLowहमले के लिए प्रमाणीकरण स्तरUser InteractionRequiredक्या पीड़ित को कार्रवाई करनी होगीScopeUnchangedघटक से परे प्रभावConfidentialityHighसंवेदनशील डेटा उजागर होने का जोखिमIntegrityHighअनधिकृत डेटा संशोधन का जोखिमAvailabilityHighसेवा बाधा का जोखिमnextguardhq.com · CVSS v3.1 आधार स्कोर
इन मेट्रिक्स का क्या मतलब है?
Attack Vector
स्थानीय — हमलावर को सिस्टम पर स्थानीय सत्र या शेल की आवश्यकता है।
Attack Complexity
निम्न — कोई विशेष शर्त नहीं। विश्वसनीय रूप से शोषण योग्य।
Privileges Required
निम्न — कोई भी वैध उपयोगकर्ता खाता पर्याप्त है।
User Interaction
आवश्यक — पीड़ित को फ़ाइल खोलनी, लिंक पर क्लिक करना या पेज पर जाना होगा।
Scope
अपरिवर्तित — प्रभाव केवल कमज़ोर घटक तक सीमित।
Confidentiality
उच्च — पूर्ण गोपनीयता हानि। हमलावर सभी डेटा पढ़ सकता है।
Integrity
उच्च — हमलावर कोई भी डेटा लिख, बदल या हटा सकता है।
Availability
उच्च — पूर्ण क्रैश या संसाधन समाप्ति। पूर्ण सेवा से इनकार।

प्रभावित सॉफ्टवेयर

घटकfortianalyzer-fortimanager
विक्रेताFortinet
प्रभावित श्रेणीमें ठीक किया गया
7.4.0 – 7.4.37.4.4
7.2.0 – 7.2.57.2.6
7.0.0 – 7.0.137.0.14
6.4.0 – 6.4.156.4.16
7.4.0 – 7.4.27.4.3
7.2.0 – 7.2.57.2.6
7.0.0 – 7.0.137.0.14
6.4.0 – 6.4.156.4.16

कमजोरी वर्गीकरण (CWE)

समयरेखा

  1. आरक्षित
  2. प्रकाशित
  3. EPSS अद्यतन

शमन और वर्कअराउंडअनुवाद हो रहा है…

The primary mitigation for CVE-2024-45331 is to upgrade to FortiAnalyzer/FortiManager version 7.4.4 or later. Before upgrading, review the Fortinet advisory for any potential compatibility issues or breaking changes. If an immediate upgrade is not possible, consider implementing temporary workarounds such as restricting access to the management interface and implementing strict access controls. Monitor system logs for suspicious activity, particularly shell command executions. While a WAF or proxy cannot directly prevent this privilege escalation, they can help detect and block malicious traffic attempting to exploit the vulnerability. Consider implementing Sigma or YARA rules to detect suspicious shell command patterns indicative of exploitation attempts. After upgrading, confirm the fix by attempting to execute the vulnerable shell commands and verifying that they are no longer successful.

कैसे ठीक करेंअनुवाद हो रहा है…

Actualice FortiAnalyzer y FortiManager a la última versión disponible. Consulte el advisory de Fortinet (FG-IR-24-127) para obtener detalles específicos sobre las versiones corregidas y las instrucciones de actualización.

CVE सुरक्षा न्यूज़लेटर

भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।

अक्सर पूछे जाने वाले सवालअनुवाद हो रहा है…

What is CVE-2024-45331 in FortiAnalyzer/FortiManager?

CVE-2024-45331 is a privilege escalation vulnerability in Fortinet FortiAnalyzer and FortiManager devices, allowing attackers to gain elevated access via shell commands.

Am I affected by CVE-2024-45331 in FortiAnalyzer/FortiManager?

You are affected if you are running FortiAnalyzer or FortiManager versions 6.4.0 through 7.4.3, or related cloud versions. Check your version against the affected range.

How do I fix CVE-2024-45331 in FortiAnalyzer/FortiManager?

Upgrade to FortiAnalyzer/FortiManager version 7.4.4 or later. Review Fortinet's advisory for upgrade instructions and potential compatibility issues.

Is CVE-2024-45331 being actively exploited?

While no active campaigns are currently confirmed, the vulnerability's nature suggests a potential for exploitation, and monitoring is recommended.

Where can I find the official FortiAnalyzer/FortiManager advisory for CVE-2024-45331?

Refer to the Fortinet security advisory and the National Vulnerability Database (NVD) entry for CVE-2024-45331 for detailed information.

क्या आपका प्रोजेक्ट प्रभावित है?

अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।