Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-21754

CVE-2024-21754: Fortinet FortiProxy Privilege Escalation

CVE-2024-21754 is a privilege escalation vulnerability in Fortinet FortiProxy that allows super-admin attackers to decrypt backup files. This article covers technical details, affected versions, impact, and mitigation.

Published: January 28, 2026

CVE-2024-21754 Overview

CVE-2024-21754 is a cryptographic vulnerability involving the use of password hash with insufficient computational effort (CWE-916) affecting Fortinet's FortiOS and FortiProxy products. This weakness allows a privileged attacker with super-admin profile and CLI access to potentially decrypt backup files, exposing sensitive configuration data and credentials stored within.

The vulnerability stems from inadequate hashing algorithms used to protect password data in configuration backups. While exploitation requires high privileges (super-admin access), the impact on confidentiality is significant as backup files often contain critical network infrastructure configurations and authentication credentials.

Critical Impact

Privileged attackers with super-admin access and CLI capabilities can decrypt FortiOS and FortiProxy backup files, potentially exposing sensitive credentials and configuration data.

Affected Products

  • Fortinet FortiOS version 7.4.3 and below
  • Fortinet FortiOS versions 7.2.x, 7.0.x, and 6.4.x (all versions)
  • Fortinet FortiProxy version 7.4.2 and below
  • Fortinet FortiProxy versions 7.2.x, 7.0.x, and 2.0.x (all versions)

Discovery Timeline

  • 2024-06-11 - CVE-2024-21754 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2024-21754

Vulnerability Analysis

This vulnerability falls under the category of Weak Hash Algorithm (CWE-916: Use of Password Hash with Insufficient Computational Effort). The core issue lies in how FortiOS and FortiProxy generate and store password hashes within backup files.

When administrators create configuration backups, the system stores password data using a hashing mechanism that lacks sufficient computational complexity. Modern password hashing algorithms like bcrypt, scrypt, or Argon2 are designed with adjustable work factors that make brute-force attacks computationally expensive. The vulnerability indicates that the hashing implementation in affected Fortinet products does not meet these security standards.

An attacker who obtains a backup file and possesses super-admin privileges with CLI access can leverage this weakness to recover plaintext passwords from the hash values. This attack requires local access to the system, which somewhat limits the attack surface, but the potential for credential recovery makes it a serious concern for enterprise environments.

Root Cause

The root cause of CVE-2024-21754 is the implementation of a password hashing algorithm that does not require sufficient computational resources to compute. This design flaw makes it feasible for attackers to perform offline brute-force or dictionary attacks against password hashes extracted from backup files.

Proper password storage should use adaptive hashing functions with configurable iteration counts or memory-hard functions that significantly increase the time and resources required to test password candidates. The affected versions of FortiOS and FortiProxy fail to implement these protections adequately.

Attack Vector

The attack vector for CVE-2024-21754 is local, requiring the attacker to already have super-admin privileges and CLI access to the Fortinet device. The typical attack scenario involves:

  1. An attacker with elevated privileges accesses the FortiOS or FortiProxy CLI
  2. The attacker exports or obtains a configuration backup file
  3. Using knowledge of the weak hashing algorithm, the attacker extracts password hashes from the backup
  4. The attacker performs offline password cracking against the extracted hashes
  5. Due to insufficient computational effort in the hashing, passwords can be recovered more easily than expected

This vulnerability does not require user interaction and has no impact on integrity or availability—it solely affects confidentiality by enabling credential disclosure.

Detection Methods for CVE-2024-21754

Indicators of Compromise

  • Unexpected backup file creation or export operations on FortiOS/FortiProxy devices
  • Unusual CLI access patterns by super-admin accounts, especially during off-hours
  • Backup files being transferred to unauthorized destinations or external storage
  • Multiple failed or successful authentication attempts from previously unknown sources after backup access

Detection Strategies

  • Monitor and audit all backup creation and export activities on Fortinet devices
  • Implement logging for all super-admin CLI sessions and review logs for anomalous activity
  • Deploy file integrity monitoring on backup storage locations to detect unauthorized access
  • Correlate backup access events with subsequent authentication patterns that may indicate credential compromise

Monitoring Recommendations

  • Enable comprehensive logging on FortiOS and FortiProxy devices with centralized log collection
  • Configure alerts for backup file operations and CLI access by privileged accounts
  • Implement behavioral analytics to detect unusual administrative activity patterns
  • Review super-admin account activity regularly and restrict CLI access to essential personnel only

How to Mitigate CVE-2024-21754

Immediate Actions Required

  • Upgrade FortiOS to version 7.4.4 or later to address this vulnerability
  • Upgrade FortiProxy to version 7.4.3 or later
  • Review and rotate all passwords that may have been stored in previously created backup files
  • Restrict super-admin privileges to essential personnel only and enforce principle of least privilege
  • Audit access to existing backup files and ensure they are stored securely with encryption at rest

Patch Information

Fortinet has released security patches addressing this vulnerability. Administrators should consult the Fortinet PSIRT Advisory FG-IR-23-423 for detailed upgrade guidance and version-specific remediation instructions.

For FortiOS, upgrade to version 7.4.4 or later. For FortiProxy, upgrade to version 7.4.3 or later. Organizations running versions in the 7.2.x, 7.0.x, 6.4.x (FortiOS), or 2.0.x (FortiProxy) branches should consult Fortinet's advisory for specific upgrade paths.

Workarounds

  • Encrypt all backup files with strong encryption before storage using external encryption tools
  • Store backup files in secured, access-controlled locations with audit logging enabled
  • Limit super-admin account creation and enforce strict access controls on administrative accounts
  • Implement network segmentation to restrict CLI access to dedicated management networks only
  • Consider using hardware security modules (HSMs) for additional credential protection where available
bash
# Configuration example for restricting admin access
config system admin
    edit "admin_user"
        set accprofile "super_admin"
        set trusthost1 10.0.0.0 255.255.255.0
        set force-password-change enable
    next
end
# Enable comprehensive logging
config log setting
    set fwpolicy-implicit-log enable
    set local-in-allow enable
    set local-in-deny-unicast enable
    set local-out enable
end

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechFortinet Fortiproxy

  • SeverityMEDIUM

  • CVSS Score4.4

  • EPSS Probability5.71%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-916
  • Vendor Resources
  • Fortinet PSIRT Advisory FG-IR-23-423
  • Related CVEs
  • CVE-2024-21762: Fortinet FortiProxy RCE Vulnerability

  • CVE-2024-55591: Fortinet FortiProxy Auth Bypass Vulnerability

  • CVE-2025-24472: Fortinet FortiProxy Auth Bypass Vulnerability

  • CVE-2025-22252: Fortinet FortiProxy Auth Bypass Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English