A missing critical step in authentication vulnerability [CWE-304] in Fortinet FortiOS version 7.6.0 through 7.6.1, 7.4.0 through 7.4.5, 7.2.0 through 7.2.10, and before 7.0.16 & FortiProxy version 7.6.0 through 7.6.1, 7.4.0 through 7.4.8, 7.2.0 through 7.2.13 and before 7.0.20 allows an API-user using api-key + PKI user certificate authentication to login even if the certificate is invalid.
References
Link | Resource |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-24-511 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
22 Jul 2025, 17:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.fortinet.com/psirt/FG-IR-24-511 - Vendor Advisory | |
CPE | cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.6.1:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
|
CWE | NVD-CWE-Other | |
First Time |
Fortinet fortiproxy
Fortinet fortios Fortinet |
08 Jul 2025, 16:18
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-08 15:15
Updated : 2025-07-22 17:25
NVD link : CVE-2024-52965
Mitre link : CVE-2024-52965
CVE.ORG link : CVE-2024-52965
JSON object : View
Products Affected
fortinet
- fortios
- fortiproxy
CWE