Fortinet has disclosed a critical vulnerability affecting multiple versions of FortiSwitch, identified as CVE-2024-48887. This flaw allows a remote, unauthenticated attacker to change administrative passwords via a specially crafted request to the FortiSwitch GUI.
This issue is being tracked with a CVSS score of 9.3 and has the potential to severely compromise administrative access and overall network integrity.
What Is CVE-2024-48887?
CVE-2024-48887 is an unauthenticated password change vulnerability within the FortiSwitch web interface. Due to inadequate validation checks, a remote attacker can send a malicious request that successfully updates administrative credentials without prior authentication.
The flaw stems from a weakness categorised under CWE-620: Unverified Password Change, and highlights broader concerns around access control design in network management interfaces.
Impacted Versions
The following FortiSwitch versions are confirmed as vulnerable:
- FortiSwitch 7.6.0 — upgrade to 7.6.1 or above
- FortiSwitch 7.4.0 through 7.4.4 — upgrade to 7.4.5 or above
- FortiSwitch 7.2.0 through 7.2.8 — upgrade to 7.2.9 or above
- FortiSwitch 7.0.0 through 7.0.10 — upgrade to 7.0.11 or above
- FortiSwitch 6.4.0 through 6.4.14 — upgrade to 6.4.15 or above
What’s the Risk?
If exploited, this vulnerability can lead to:
-
Unauthorised administrative access
Attackers can take control of FortiSwitch administrative functions and alter network configurations.
-
Loss of network control and visibility
Malicious changes could redirect traffic, introduce backdoors, or disable monitoring.
-
Data breach and compliance exposure
With privileged access, attackers could extract sensitive data or alter access controls across connected infrastructure.
Recommended Actions
To reduce exposure and mitigate risk:
1. Apply Security Updates
Fortinet has issued patches across supported branches. All impacted systems should be upgraded to the latest secure version as a priority.
2. Restrict GUI Access
Where updates cannot be applied immediately:
- Disable HTTP/HTTPS administrative access from untrusted networks
- Restrict access to the GUI to known, trusted hosts only
3. Strengthen Network Controls
- Enforce network segmentation between management and production environments
- Use multi-factor authentication where supported
- Review and monitor administrative change logs for signs of unauthorised access
Discovery and Disclosure
This issue was internally discovered by Daniel Rozeboom of Fortinet’s FortiSwitch web UI development team and publicly disclosed on 8 April 2025.