Home Fortinet CVE-2024-52965
Back to Fortinet

CVE-2024-52965

FortiOS - Authentication Module

Fortinet CVSS 7.2 Updated March 16, 2026

Executive Risk Summary

"A missing critical step in authentication vulnerability in Fortinet FortiOS and FortiProxy allows an API-user using api-key + PKI user certificate authentication to login even if the certificate is invalid, potentially leading to unauthorized access. This vulnerability affects FortiOS version 7.6.0 through 7.6.1, 7.4.0 through 7.4.5, 7.2.0 through 7.2.10, and before 7.0.16, as well as FortiProxy version 7.6.0 through 7.6.1, 7.4.0 through 7.4.8, 7.2.0 through 7.2.13 and before 7.0.20."

Operational Audit Arsenal

Target Type Firmware Image
Target Asset FortiOS
Standard Path Global Firmware

Manual Verification Required

This is a non-Windows asset (Fortinet). Use the target asset details above to verify your version against vendor advisories.

Patch Impact Forecast

Reboot Required Likely

Moderate

Internal Work Notes

Fortinet FortiOS and FortiProxy authentication vulnerability (CVE-2024-52965) - apply latest patch to prevent unauthorized access

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Scope of Impact

Fortinet Fortios (Version 7.6.0)Fortinet Fortios (Version 7.6.1)Fortinet FortiosFortinet Fortiproxy

Original NVD Description

"A missing critical step in authentication vulnerability [CWE-304] in Fortinet FortiOS version 7.6.0 through 7.6.1, 7.4.0 through 7.4.5, 7.2.0 through 7.2.10, and before 7.0.16 & FortiProxy version 7.6.0 through 7.6.1, 7.4.0 through 7.4.8, 7.2.0 through 7.2.13 and before 7.0.20 allows an API-user using api-key + PKI user certificate authentication to login even if the certificate is invalid."

Related Fortinet Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.