CVE-2024-26009
CVSS Score
7.9
EPSS Score
0.0%
EPSS Percentile
0th
An authentication bypass using an alternate path or channel [CWE-288] vulnerability in Fortinet FortiOS version 6.4.0 through 6.4.15 and before 6.2.16, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8 and before 7.0.15 & FortiPAM before version 1.2.0 allows an unauthenticated attacker to seize control of a managed device via crafted FGFM requests, if the device is managed by a FortiManager, and if the attacker knows that FortiManager's serial number.
| CWE | CWE-288 |
| Vendor | fortinet |
| Product | fortipam |
| Ecosystems | |
| Industries | NetworkingSecurity |
| Published | Aug 12, 2025 |
| Last Updated | Feb 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for fortinet fortipam
Be the first to know when new high vulnerabilities affecting fortinet fortipam are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Fortinet / FortiPAM
1.2.0 1.1.0 ≤ 1.1.2 1.0.0 ≤ 1.0.3
Fortinet / FortiSwitchManager
7.2.0 ≤ 7.2.3 7.0.0 ≤ 7.0.3
Fortinet / FortiProxy
7.4.0 ≤ 7.4.2 7.2.0 ≤ 7.2.8 7.0.0 ≤ 7.0.15
Fortinet / FortiOS
6.4.0 ≤ 6.4.15 6.2.0 ≤ 6.2.16 6.0.0 ≤ 6.0.18