Auth Bypass via CSF Proxy in FortiOS 7.0.07.0.16 & FortiProxy 7.0.07.2.12
CVE-2025-24472 Published on February 11, 2025
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.2.0 through 7.2.12, 7.0.0 through 7.0.19 may allow a remote unauthenticated attacker with prior knowledge of upstream and downstream devices serial numbers to gain super-admin privileges on the downstream device, if the Security Fabric is enabled, via crafted CSF proxy requests.
Known Exploited Vulnerability
This Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Fortinet FortiOS and FortiProxy contain an authentication bypass vulnerability that allows a remote attacker to gain super-admin privileges via crafted CSF proxy requests.
The following remediation steps are recommended / required by April 8, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Vulnerability Analysis
CVE-2025-24472 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. This vulnerability is known to be actively exploited by threat actors. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
Authentication Bypass Using an Alternate Path or Channel
A product requires authentication, but the product has an alternate path or channel that does not require authentication.
Products Associated with CVE-2025-24472
stack.watch emails you whenever new vulnerabilities are published in Fortinet FortiProxy or Fortinet FortiOS. Just hit a watch button to start following.
Affected Versions
Fortinet FortiProxy:- Version 7.2.0, <= 7.2.12 is affected.
- Version 7.0.0, <= 7.0.19 is affected.
- Version 7.0.0, <= 7.0.16 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.