CVE-2024-48887

CWE-6206 documents6 sources
Severity
9.8CRITICAL
EPSS
0.4%
top 41.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 8
Latest updateApr 14

Description

A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a specially crafted request

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

NVDfortinet/fortiswitch6.4.06.4.15+4
CVEListV5fortinet/fortiswitch7.4.07.4.4+4

🔴Vulnerability Details

2
GHSA
GHSA-w84w-59g8-pmg9: A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a spe2025-04-08
CVEList
CVE-2024-48887: A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a spe2025-04-08

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Fortinet FortiSwitch Unauthenticated Unverified Password Change (CVE-2024-48887)2025-04-14

📋Vendor Advisories

1
Fortinet
Unverified password change via set_password endpoint2025-04-08

🕵️Threat Intelligence

1
Bleepingcomputer
Critical FortiSwitch flaw lets hackers change admin passwords remotely2025-04-09
CVE-2024-48887 (CRITICAL CVSS 9.8) | A unverified password change vulner | cvebase.io