CVE-2024-47575 Overview
A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests.
Critical Impact
This vulnerability allows attackers to execute arbitrary code or commands, potentially compromising sensitive systems and data.
Affected Products
- Fortinet FortiManager
- Fortinet FortiManager Cloud
Discovery Timeline
- 2024-10-23 - CVE CVE-2024-47575 published to NVD
- 2025-10-24 - Last updated in NVD database
Technical Details for CVE-2024-47575
Vulnerability Analysis
This vulnerability arises due to missing authentication in critical functions. This flaw allows an attacker to send specially crafted requests to execute arbitrary commands in the context of the application, potentially taking control of the affected system.
Root Cause
The vulnerability is caused by the absence of required authentication checks in critical functionalities within the FortiManager system.
Attack Vector
The attack is carried out remotely over the network, exploiting the lack of authentication in the application.
# Example exploitation code (sanitized)
import requests
url = "http://target-system/vulnerable-endpoint"
headers = {
'Content-Type': 'application/json'
}
payload = {
"command": "malicious_payload"
}
response = requests.post(url, headers=headers, json=payload)
print(response.status_code)
Detection Methods for CVE-2024-47575
Indicators of Compromise
- Unexpected outgoing connections from FortiManager
- Unusual spike in command usage logs
- Presence of unknown processes or files
Detection Strategies
Organizations should deploy network monitoring tools to detect unauthorized access attempts and inspect HTTP requests to identify malicious payloads.
Monitoring Recommendations
Regularly audit access logs for unusual activity, and use Intrusion Detection Systems (IDS) with signatures tailored for FortiManager traffic anomalies.
How to Mitigate CVE-2024-47575
Immediate Actions Required
- Block external network access to FortiManager
- Apply security patches released by Fortinet
- Increase monitoring for unusual activities
Patch Information
Please refer to Fortinet's advisory for patch availability and installation instructions.
Workarounds
Restrict access to critical functionalities by implementing network segmentation and firewall rules.
# Configuration example
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

