Fortinet has disclosed a significant OS command injection vulnerability in its FortiDDoS-F appliances that could allow privileged attackers to execute unauthorized code or commands through the command-line interface (CLI).
The security flaw, identified as CVE-2024-45325, affects multiple versions of the FortiDDoS-F product line and carries a CVSS 3.1 score of 6.5, indicating medium severity.
Vulnerability Details
The vulnerability stems from improper neutralization of special elements used in OS commands, classified under Common Weakness Enumeration (CWE-78).
This OS command injection flaw specifically targets the FortiDDoS-F CLI, enabling malicious actors with privileged access to craft specialized CLI requests that bypass security controls.
The exploit could potentially compromise the integrity and confidentiality of affected systems, as reflected in the vulnerability’s high impact ratings for confidentiality, integrity, and availability.
Field | Details |
CVE ID | CVE-2024-45325 |
Vulnerability Type | OS command injection in CLI (CWE-78) |
Summary | Improper neutralization of special elements in OS commands allows privileged attackers to execute unauthorized code or commands via crafted CLI requests. |
Affected Component | FortiDDoS-F Command-Line Interface |
Severity | Medium |
CVSS v3.1 Score | 6.5 (AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C) |
FortiDDoS-F appliances serve as critical network defense components, protecting organizations against distributed denial-of-service attacks.
A successful exploitation of this vulnerability could undermine an organization’s entire DDoS protection infrastructure, potentially leaving networks exposed to large-scale attacks while simultaneously providing attackers with unauthorized system access.
The vulnerability affects an extensive range of FortiDDoS-F versions, with FortiDDoS-F 7.0 users needing to upgrade to version 7.0.3 or above.
Organizations running older versions face more significant challenges, as FortiDDoS-F versions 6.1 through 6.6 require complete migration to fixed releases rather than simple updates.
Fortunately, FortiDDoS-F 7.2 users remain unaffected by this vulnerability.
The security flaw was internally discovered and reported by Théo Leleu from Fortinet’s Product Security team, demonstrating the company’s proactive approach to identifying and addressing security issues within their products.
FortiDDoS-F Version | Affected Status | Required Action |
7.2 | Not Affected | No Action Required |
7.0.0 – 7.0.2 | Affected | Upgrade to 7.0.3+ |
6.1 – 6.6 (All) | Affected | Migrate to Fixed Release |
Organizations should prioritize immediate remediation of this vulnerability, particularly given its potential impact on critical network security infrastructure.
While the vulnerability requires privileged access to exploit, the widespread affected version range and the critical nature of FortiDDoS-F appliances in network defense make prompt action essential.
Fortinet published the initial disclosure on September 9, 2025, providing administrators with detailed remediation guidance through advisory FG-IR-24-344.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
Source link