Home Fortinet CVE-2024-35279
Back to Fortinet

CVE-2024-35279

FortiOS - CAPWAP Control

Fortinet CVSS 8.1 Updated March 16, 2026

Executive Risk Summary

"A stack-based buffer overflow vulnerability in Fortinet FortiOS versions 7.2.4 through 7.2.8 and 7.4.0 through 7.4.4 allows a remote unauthenticated attacker to execute arbitrary code or commands via crafted UDP packets. This vulnerability can be exploited if the attacker can evade FortiOS stack protections and the fabric service is running on the exposed interface."

Operational Audit Arsenal

Target Type Firmware Image
Target Asset FortiOS
Standard Path Global Firmware

Manual Verification Required

This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.

Patch Impact Forecast

Reboot Required Likely

Network connectivity may be interrupted during the patching process

Internal Work Notes

Remote code execution vulnerability in FortiOS, patching required to prevent exploitation

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Scope of Impact

Fortinet Fortios

Original NVD Description

"A stack-based buffer overflow [CWE-121] vulnerability in Fortinet FortiOS version 7.2.4 through 7.2.8 and version 7.4.0 through 7.4.4 allows a remote unauthenticated attacker to execute arbitrary code or commands via crafted UDP packets through the CAPWAP control, provided the attacker were able to evade FortiOS stack protections and provided the fabric service is running on the exposed interface."

Related Fortinet Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.