CVE-2024-21762
A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- January 02, 2024
- Published Date
- February 09, 2024
- Last Updated
- April 24, 2025
- Vendor
- Fortinet
- Product
- FortiProxy, FortiOS
- Description
- A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:W/RC:C
EPSS Score
- Score
- 91.37% (Percentile: 99.62%) as of 2025-04-29
SSVC Information
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- total
References
Known Exploited Vulnerability Information
Recent Mentions
Reducing Remediation Time Remains a Challenge: How Tenable Vulnerability Watch Can Help
Source: Tenable Blog • Published: 2025-04-25 19:58:48 UTC
Verizon 2025 DBIR: Tenable Research Collaboration Shines a Spotlight on CVE Remediation Trends
Source: Tenable Blog • Published: 2025-04-23 04:05:00 UTC
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
d0rb/CVE-2024-21762
Type: github • Created: 2024-03-17 09:15:22 UTC • Stars: 13
r4p3c4/CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check
Type: github • Created: 2024-03-13 22:57:00 UTC • Stars: 12
h4x0r-dz/CVE-2024-21762
Type: github • Created: 2024-03-13 09:17:28 UTC • Stars: 135
cleverg0d/CVE-2024-21762-Checker
Type: github • Created: 2024-03-11 12:28:05 UTC • Stars: 13