Full-text search. Typo-tolerant.

CVE-2024-21762 - [KEV] - CVSS 9.8

Overview

CVE-2024-21762 is a critical out-of-bounds write vulnerability in Fortinet FortiOS and FortiProxy that permits a remote, unauthenticated attacker to achieve arbitrary code or command execution through specially crafted HTTP requests targeting the SSL VPN component. The flaw carries a CVSSv3 score of 9.8 and an EPSS score of 0.927, reflecting both maximal technical severity and a very high probability of exploitation. CISA added the CVE to its Known Exploited Vulnerabilities (KEV) catalog on February 9, 2024, and it is currently assessed at the widespread exploitation maturity level. The vulnerability has additionally been associated with ransomware operations, making exposed Fortinet edge devices an immediate, high-priority risk.

Affected Products

Administrators should consult Fortinet PSIRT advisory FG-IR-24-015 for the authoritative list of fixed builds and apply vendor-defined upgrade paths rather than relying on branch numbers alone.

Exploitation Evidence

No specific exploitation telemetry (e.g., malware samples, attacker IPs, or campaign indicators) is recorded in the source dataset for this briefing. However, the vulnerability’s presence on the CISA KEV list and its widespread exploitation maturity rating confirm that in-the-wild abuse is occurring at scale. Public reporting has linked exploitation of CVE-2024-21762 to opportunistic mass scanning of internet-exposed FortiGate appliances, with successful compromises observed against unpatched SSL VPN portals.

ATT&CK Mapping

No formal ATT&CK mappings are provided in the source dataset. Based on the vulnerability class and known exploitation behavior against Fortinet edge devices, defenders should anticipate the following likely techniques:

Threat Actor Context

No specific threat actor attribution is recorded in the source dataset. The ransomware-associated flag on this CVE indicates that ransomware affiliates have incorporated it into their initial-access tooling. Historically, Fortinet SSL VPN vulnerabilities have been leveraged by both Chinese state-aligned intrusion sets and financially motivated ransomware operators; organizations should treat any compromise of a vulnerable FortiGate as a credible precursor to data theft or encryption events.

Recommended Actions