FortiOS Format-String CVE-2024-45324 (v7.4.0-7.4.4 & v7.2.0-7.2.9 +)
CVE-2024-45324 Published on March 11, 2025
A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.0 through 7.4.4, version 7.2.0 through 7.2.9, version 7.0.0 through 7.0.15 and before 6.4.15, FortiProxy version 7.4.0 through 7.4.6, version 7.2.0 through 7.2.12 and before 7.0.19, FortiPAM version 1.4.0 through 1.4.2 and before 1.3.1, FortiSRA version 1.4.0 through 1.4.2 and before 1.3.1 and FortiWeb version 7.4.0 through 7.4.5, version 7.2.0 through 7.2.10 and before 7.0.10 allows a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands.
Vulnerability Analysis
CVE-2024-45324 is exploitable with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
Use of Externally-Controlled Format String
The software uses a function that accepts a format string as an argument, but the format string originates from an external source.
Products Associated with CVE-2024-45324
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2024-45324 are published in these products:
Affected Versions
Fortinet FortiPAM:- Version 1.4.0, <= 1.4.2 is affected.
- Version 1.3.0, <= 1.3.1 is affected.
- Version 1.2.0 is affected.
- Version 1.1.0, <= 1.1.2 is affected.
- Version 1.0.0, <= 1.0.3 is affected.
- Version 7.6.0 is affected.
- Version 7.4.0, <= 7.4.5 is affected.
- Version 7.2.0, <= 7.2.10 is affected.
- Version 7.0.0, <= 7.0.10 is affected.
- Version 7.6.0 is affected.
- Version 7.4.0, <= 7.4.6 is affected.
- Version 7.2.0, <= 7.2.12 is affected.
- Version 7.0.0, <= 7.0.19 is affected.
- Version 1.4.0, <= 1.4.2 is affected.
- Version 7.4.0, <= 7.4.4 is affected.
- Version 7.2.0, <= 7.2.9 is affected.
- Version 7.0.0, <= 7.0.15 is affected.
- Version 6.4.0, <= 6.4.15 is affected.
- Version 6.2.0, <= 6.2.16 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.