Home Fortinet CVE-2024-48887
Back to Fortinet

CVE-2024-48887

FortiSwitch - GUI

Fortinet CVSS 9.8 Updated March 16, 2026

Executive Risk Summary

"A remote unauthenticated attacker may exploit a vulnerability in Fortinet FortiSwitch GUI to change admin passwords via a specially crafted request, potentially leading to unauthorized access and system compromise. This vulnerability poses a significant risk to network security and integrity, as an attacker could leverage it to gain control over the FortiSwitch device."

Operational Audit Arsenal

Target Type Firmware Image
Target Asset FortiSwitch Firmware
Standard Path Global Firmware

Manual Verification Required

This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.

Patch Impact Forecast

Reboot Required Likely

Network connectivity may be temporarily disrupted during the patching process

Internal Work Notes

FortiSwitch GUI vulnerability (CVE-2024-48887) - potential for unauthorized admin password change, recommend immediate patching and verification of firmware version via CLI command 'get system status' to ensure version is not vulnerable

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Scope of Impact

Fortinet Fortiswitch (Version 7.6.0)Fortinet Fortiswitch

Original NVD Description

"A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a specially crafted request"

Related Fortinet Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.