9.8
CVSSv3

CVE-2024-21762

CVSSv4: NA | CVSSv3: 9.8 | CVSSv2: NA | VMScore: 1000 | EPSS: 0.91908 | KEV: Exploitation Reported
Published: 09/02/2024 Updated: 29/11/2024

Vulnerability Summary

A out-of-bounds write in Fortinet FortiOS versions 7.4.0 up to and including 7.4.2, 7.2.0 up to and including 7.2.6, 7.0.0 up to and including 7.0.13, 6.4.0 up to and including 6.4.14, 6.2.0 up to and including 6.2.15, 6.0.0 up to and including 6.0.17, FortiProxy versions 7.4.0 up to and including 7.4.2, 7.2.0 up to and including 7.2.8, 7.0.0 up to and including 7.0.14, 2.0.0 up to and including 2.0.13, 1.2.0 up to and including 1.2.13, 1.1.0 up to and including 1.1.6, 1.0.0 up to and including 1.0.7 allows malicious user to execute unauthorized code or commands via specifically crafted requests

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fortinet fortiproxy

fortinet fortios

Vendor Advisories

Check Point Reference: CPAI-2024-0133 Date Published: 26 Mar 2024 Severity: High ...

Exploits

Fortinet FortiOS suffers from an out of bounds write vulnerability Affected includes Fortinet FortiOS versions 740 through 742, 720 through 726, 700 through 7013, 640 through 6414, 620 through 6215, 600 through 6017, FortiProxy versions 740 through 742, 720 through 728, 700 through 7014, 200 through 2013, 1 ...

Github Repositories

Additional modules for Artemis (githubcom/CERT-Polska/Artemis) that weren't included in in the core repository for licensing reasons To run, clone this repository inside the Artemis directory The /scripts/start script will automatically detect and run these modules If you cloned the repository inside the Artemis directory, the report generation feature (descri

FortiGate cve-2024-21762-checker This script is used to check for vulnerabilities in Fortigate SSL VPNs based on CVE-2024-21762 It uses Shodan to find vulnerable devices and test their vulnerability Features Uses Shodan API to find Fortigate devices running SSL VPN on port 10443 Checks the vulnerability status of the devices Flexible shodan queries Displays the result with

CVE-2024-21762 is an out of bounds write vulnerability in fortinet fortios which leads to unauthenticated remote code execution

CVE-2024-21762-PoC CVE-2024-21762 is an out of bounds write vulnerability in fortinet fortios which leads to unauthenticated remote code execution Details: The vulnerability is out-of-bounds write as described by Fortinet as per publicly disclosed some of the informations about this vuln, we know that it have to do with ssl vpn so I started diffing the old versions (742, 7

The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.

🇮🇱 #BringThemHome #NeverAgainIsNow 🇮🇱 We demand the safe return of all citizens who have been taken hostage by the terrorist group Hamas We will not rest until every hostage is released and returns home safely You can help bring them back home storiesbringthemhomenownet/ CVE-2024-21762 The PoC demonstrates the potential for remote code execution by e

FortiOS 6.0 - 7.4.2 Out of bound exploit --> RCE!!!

CVE-2024-21762-POC CVE-2024-21762 proof of concept is an exploitation out of bound write vulnerability

Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762

CVE-2024-21762 Check Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762 For more information, see this Bishop Fox blog post Usage python3 check-cve-2024-21762py <host> <port> In most cases, the script will either output "Vulnerable" or "Patched" It performs minimal

The only one working RCE exploit that sells for $1,000 on the darknet

CVE-2024-21762-Fortinet-RCE-ALLWORK The only one working RCE exploit that sells for $5,000 on the darknet THE ONLY ONE THAT WORKS PUBLIC EXPLOIT! Based on BishopFox research Link 🔥 CVSS: 10/10 Exploit details Cybersecurity researcher BishopFox recently released a detailed study of one of the new trending FortiOS vulnerabilities, CVE-2024-21762 CVE-2024-21762 is a forbidden

CVE-2024-21762-POC replayse published

CVE-2024-21762-POC CVE-2024-21762 proof of concept is an exploitation out of bound write vulnerability

This script performs vulnerability scanning for CVE-2024-21762, a Fortinet SSL VPN remote code execution vulnerability. It checks whether a given server is vulnerable to this CVE by sending specific requests and analyzing the responses.

CVE-2024-21762-Checker This script performs vulnerability scanning for CVE-2024-21762, a Fortinet SSL VPN remote code execution vulnerability It checks whether a given server is vulnerable to this CVE by sending specific requests and analyzing the responses For more information, see this Bishop Fox blog post Usage The script supports two modes of operation: Single check: You

🛠️ CVE-2024-21762 Exploit 🌟 Description CVE-2024-21762 proof of concept is an exploitation out of bound write vulnerability in fortinet SSL VPN which leads to unauthenticated RCE if successfully explited as per my efforts to reproduce the exploit from nothing/scratch, it was a bit complicated and noticeably very deffirent from the previous fortinet vulnerablities ⚙

CVE-2024-21762 是 Fortinet 公司的 FortiOS 和 FortiProxy 产品中的一个严重漏洞,存在于其 SSL VPN 组件中。

cve-2024-21762-poc CVE-2024-21762 是 Fortinet 公司的 FortiOS 和 FortiProxy 产品中的一个严重漏洞,存在于其 SSL VPN 组件中。该漏洞允许未经身份验证的远程攻击者通过特制的 HTTP 请求在目标系统上执行任意代码或命令,可能导致系统被完全控制。 危害: 由于该漏洞的存在,攻击者可以在不需要任何

Full exploit of Cve-2024-21762!

Cve-2024-21762- Full exploit of Cve-2024-21762! Check poc file here for full exploit with payloads contact me on tox: 218A88078DA93D22E9E47D022EC88105FCBFCE6349B8E527D1D9224B3284A226D3E90D1D01AA Escrow Accepted

FortiOS 6.0 - 7.4.2 Out of bound exploit --> RCE!!!

CVE-2024-21762-POC CVE-2024-21762 proof of concept is an exploitation out of bound write vulnerability

Security LLaMA2 Fine-tuning This repository contains tools and scripts for fine-tuning the LLaMA2 model using advanced techniques such as Proximal Policy Optimization (PPO) and Reinforcement Learning (RL) with a specialized reward model Key components include: llama2_ppo_trainerpy: Script for PPO training llama2_reward_model_trainerpy : Scripts for training the reward mode

RCE exploit for FortiOS 6.0-7.4.2

CVE-2024-21762-RCE-exploit RCE exploit for FortiOS 60-742

The only one working RCE exploit that sells for $5,000 on the darknet

CVE-2024-21762-Fortinet-RCE-WORK The only one working RCE exploit that sells for $5,000 on the darknet THE ONLY ONE THAT WORKS PUBLIC EXPLOIT! Based on BishopFox research Link 🔥 CVSS: 10/10 Exploit details Cybersecurity researcher BishopFox recently released a detailed study of one of the new trending FortiOS vulnerabilities, CVE-2024-21762 CVE-2024-21762 is a forbidden en

out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability

CVE-2024-21762 out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability

Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)

CVE-2024-21762-Exploit-PoC-Fortinet-SSL-VPN-Check Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación) Uso python3 check-cve-2024-21762py <host> <port> Instalas Git: sudo apt install git

Fortinet CVE 2024

CVE-2024-21762_POC Fortinet CVE 2024 REFERENCE -> tiangonglabgithubio/blog/tiangongarticle021/ CVE-2024-21762 -> vulnerability in fortios/fortiproxy that leads to unauthenticated remote code execution Exploit written in python and able to work in multithreaded mode, it is also possible to give a list of ip addresses as a parameter I have included a MANU

CVE-2024-21762-POC CVE-2024-21762 is an out of bound write vulnerability in fortinet sslvpn which leads to unauthenticated RCE if successfully explited as per my efforts to reproduce the exploit from nothing/scratch, it was a bit complicated and noticeably very deffirent from the previous fortinet vulnerablities I including infopdf in this download to make its easier to spot

proof-of-concept out-of-bound write vuln in FortiOS ---> RCE

CVE-2024-21762-Exploit proof-of-concept out-of-bound write vuln in FortiOS ---> RCE

Real proof-of-concept out-of-bound write vuln in FortiOS ---> RCE

CVE-2024-21762-Exploit-POC Real proof-of-concept out-of-bound write vuln in FortiOS ---> RCE

The only one working RCE exploit that sells for $5,000 on the darknet

CVE-2024-21762-Fortinet-RCE-WORK The only one working RCE exploit that sells for $5,000 on the darknet THE ONLY ONE THAT WORKS PUBLIC EXPLOIT! Based on BishopFox research Link 🔥 CVSS: 10/10 Exploit details Cybersecurity researcher BishopFox recently released a detailed study of one of the new trending FortiOS vulnerabilities, CVE-2024-21762 CVE-2024-21762 is a forbidden en

CVEFeed.io: The Ultimate Hub for Vulnerability Insights and Intelligence

cvefeedio cvefeedio: Your Go-To Place for Finding Out About Security Feed and Intelligence I'm always on the lookout for the newest information on security problems I've searched high and low, from Twitter to RSS feeds, but was surprised there wasn't a single place that had all the info I needed Example CVE detail page: CVE-2024-21762 Example Produc

Recent Articles

Fortinet: Hackers retain access to patched FortiGate VPNs using symlinks
BleepingComputer • Sergiu Gatlan • 11 Apr 2025

Fortinet: Hackers retain access to patched FortiGate VPNs using symlinks By Sergiu Gatlan April 11, 2025 12:08 PM 0 Fortinet warns that threat actors use a post-exploitation technique that helps them maintain read-only access to previously compromised FortiGate VPN devices even after the original attack vector was patched. Earlier this week, Fortinet began sending emails to customers warning that their FortiGate/FortiOS devices were compromised based on telemetry received from FortiGuard devices...

Exploit released for Fortinet RCE bug used in attacks, patch now
BleepingComputer • Sergiu Gatlan • 21 Mar 2024

Exploit released for Fortinet RCE bug used in attacks, patch now By Sergiu Gatlan March 21, 2024 11:17 AM 0 Security researchers have released a proof-of-concept (PoC) exploit for a critical vulnerability in Fortinet's FortiClient Enterprise Management Server (EMS) software, which is now actively exploited in attacks. Tracked as CVE-2023-48788, this security flaw is an SQL injection in the DB2 Administration Server (DAS) component discovered and reported by the UK's National Cyber Security Centr...

Fortinet warns of critical RCE bug in endpoint management software
BleepingComputer • Sergiu Gatlan • 13 Mar 2024

Fortinet warns of critical RCE bug in endpoint management software By Sergiu Gatlan March 13, 2024 02:48 PM 0 Fortinet patched a critical vulnerability in its FortiClient Enterprise Management Server (EMS) software that can allow attackers to gain remote code execution (RCE) on vulnerable servers. FortiClient EMS enables admins to manage endpoints connected to an enterprise network, allowing them to deploy FortiClient software and assign security profiles on Windows devices. The security flaw (C...

Critical Fortinet flaw may impact 150,000 exposed devices
BleepingComputer • Ionut Ilascu • 08 Mar 2024

Critical Fortinet flaw may impact 150,000 exposed devices By Ionut Ilascu March 8, 2024 03:37 PM 0 Scans on the public web show that approximately 150,000 Fortinet FortiOS and FortiProxy secure web gateway systems are vulnerable to CVE-2024-21762, a critical security issue that allows executing code without authentication. America's Cyber Defense Agency CISA confirmed last month that attackers are actively exploiting the flaw by adding it to its Known Exploited Vulnerabilities (KEV) catalog. Vul...

More than 133,000 Fortinet appliances still vulnerable to month-old critical bug
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources A huge attack surface for a vulnerability with various PoCs available

The volume of Fortinet boxes exposed to the public internet and vulnerable to a month-old critical security flaw in FortiOS is still extremely high, despite a gradual increase in patching. According to security nonprofit Shadowserver's latest data, the number of Fortinet appliances vulnerable to CVE-2024-21762 stands at more than 133,000 – down only slightly from more than 150,000 ten days prior. Fortinet patched CVE-2024-21762 in early February, well over a month ago. It's a 9.6 severity vuln...