Home Fortinet CVE-2024-46667
Back to Fortinet

CVE-2024-46667

FortiSIEM - Core

Fortinet CVSS 7.5 Updated March 16, 2026

Executive Risk Summary

"A vulnerability in Fortinet FortiSIEM may allow an attacker to deny valid TLS traffic by consuming all allotted connections, potentially leading to a denial-of-service condition. This vulnerability affects FortiSIEM versions 5.3, 5.4, 6.x, 7.0, and 7.1.0 through 7.1.5."

Operational Audit Arsenal

Target Type Firmware Image
Target Asset FortiSIEM Image
Standard Path Global Firmware

Manual Verification Required

This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.

Patch Impact Forecast

Reboot Required Likely

High

Internal Work Notes

FortiSIEM vulnerability CVE-2024-46667 may cause denial-of-service due to unthrottled resource allocation, upgrade to a patched version as soon as possible.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Scope of Impact

Fortinet Fortisiem (Version 5.4.0)Fortinet Fortisiem

Original NVD Description

"A allocation of resources without limits or throttling in Fortinet FortiSIEM 5.3 all versions, 5.4 all versions, 6.x all versions, 7.0 all versions, and 7.1.0 through 7.1.5 may allow an attacker to deny valid TLS traffic via consuming all allotted connections."

Related Fortinet Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.