Threat Advisory

Multiple Fortinet Flaws in Authentication and Access

Threat: Vulnerability
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: Medium

EXECUTIVE SUMMARY:

A set of medium-severity vulnerabilities has been disclosed across multiple Fortinet products including FortiOS, FortiProxy, FortiWeb, and FortiSASE. These flaws affect SSL-VPN session handling, GUI WebSocket functionality, certificate validation, and Security Fabric authentication, potentially enabling unauthorized access, privilege escalation, or spoofed device identities. Although none are rated as critical, their exploitation could compromise administrative boundaries, authentication integrity, and secure communications across network segments. Fortinet has released patches addressing each issue, and users are strongly advised to update affected systems to minimize risk exposure.

 

  • CVE‑2024‑50562 – Session reuse vulnerability with a CVSS score of 4.4, where SSL-VPN session cookies are not properly invalidated, allowing reuse after logout.

 

  • CVE‑2025‑22254 – WebSocket privilege escalation with a CVSS score of 6.5, enabling read-only GUI users to gain super-admin access through crafted WebSocket messages.

 

  • CVE‑2025‑22862 – Improper GUI access control with a CVSS score of 6.3, allowing attackers to elevate privileges by exploiting insufficient GUI restrictions.

 

  • CVE‑2024‑50568 – Fabric identity spoofing with a CVSS score of 5.6, where unauthenticated users can impersonate downstream devices over TCP in the Security Fabric.

 

  • CVE‑2025‑24471 – Certificate validation flaw with a CVSS score of 5.3, permitting EAP-TLS connections using revoked or improperly validated certificates.

 

These vulnerabilities affect critical security functions like session control and authentication across Fortinet products. Prompt patching is essential to prevent unauthorized access and privilege escalation.

RECOMMENDATION:

We strongly recommend you upgrade Fortinet products to below version links:

REFERENCES:

The following reports contain further technical details:

crossmenu