AI description
CVE-2024-48887 is an unverified password change vulnerability affecting the FortiSwitch GUI. It allows a remote, unauthenticated attacker to modify administrator passwords by sending a specially crafted request. The vulnerability exists in FortiSwitch versions 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.8, 7.0.0 through 7.0.10, and 6.4.0 through 6.4.14. Fortinet has released updates to address this issue, and users are advised to upgrade to the respective fixed versions. As a workaround, disabling HTTP/HTTPS access from administrative interfaces and configuring trusted hosts can mitigate the risk.
- Description
- A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a specially crafted request
- Source
- psirt@fortinet.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- psirt@fortinet.com
- CWE-620
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
1
🚨 Critical alert for Fortinet users! A 9.3 CVSS flaw (CVE-2024-48887) in FortiSwitch lets hackers remotely change admin passwords — no login needed. 🔧 Fix it: Upgrade ASAP (7.6.1+, 7.4.5+, 7.2.9+, 7.0.11+, 6.4.15+) ⚡ No exploits yetbut Fortinet bugs have been weaponized https
@achi_tech
12 Apr 2025
34 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-48887
@transilienceai
12 Apr 2025
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
A new Fortinet vulnerability just dropped – and it’s a big one. CVE-2024-48887 lets attackers reset FortiSwitch admin passwords without authentication. One crafty HTTP request, and boom — full control over your switch. https://t.co/Q0HDxE0egm
@GelosSnake
10 Apr 2025
494 Impressions
0 Retweets
6 Likes
1 Bookmark
1 Reply
1 Quote
Fortinet patches critical FortiSwitch vuln (CVE-2024-48887) allowing unauthenticated password changes via GUI. Affected: v6.4–7.6 Fix: Upgrade to 6.4.15, 7.0.11, 7.2.9, 7.4.5, or 7.6.1 Temp fix: Disable web admin access #CyberSecurity #Fortinet #CVE202448887 https://t.co/q667
@CloneSystemsInc
10 Apr 2025
67 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
🗞️ Critical FortiSwitch Flaw Enables Remote Admin Password Takeover by Hackers Fortinet’s FortiSwitch has a critical flaw (CVE-2024-48887) that lets hackers remotely change admin passwords. Rated 9.8/10 in severity, it’s a high-risk threat with no known exploits yet. Patch now
@gossy_84
10 Apr 2025
61 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#FortiSwitch #vulnerability may give attackers control over vulnerable devices (#CVE-2024-48887) https://t.co/nkZQrmR4Cj
@ScyScan
10 Apr 2025
20 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📢 CiberSeguridad en menos de 5 minutos 🛠️ Oracle niega brecha en la nube – Ataque afectó solo a dos servidores obsoletos; no hubo acceso a Oracle Cloud Infrastructure ni datos de clientes. 🔐 FortiSwitch con fallo crítico – CVE-2024-48887 permite a atacantes no autenticados ht
@Seifreed
10 Apr 2025
440 Impressions
2 Retweets
16 Likes
2 Bookmarks
0 Replies
0 Quotes
This week's major security updates: Fortinet patched a critical FortiSwitch flaw (CVE-2024-48887, 9.8 CVSS), WhatsApp fixed a malware trick (CVE-2025-30401), SAP addressed code injection (CVE-2025-27429, CVE-2025-31330) & auth bypass (CVE-2025-30016).
@CyberWatch_News
10 Apr 2025
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#CybersecurityNEWS🔴👨💻👾 Fortinet ha lanzado un parche para solucionar una vulnerabilidad crítica en FortiSwitch (CVE-2024-48887) que podría permitir a atacantes remotos cambiar contraseñas de administrador. Ver más: https://t.co/9jwvu27u5e #ciberseguridad #DevelNews https:/
@develsecurity
10 Apr 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical flaw (CVE-2024-48887) in FortiSwitch devices allows unauthenticated attackers to change admin passwords remotely! Versions 6.4.0 to 7.6.0 impacted. Patches available. ⚠️ #Fortinet #InfoSec #USA link: https://t.co/lMhTYULXXp https://t.co/L3oW0NLms2
@TweetThreatNews
9 Apr 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Security Alert – CVE-2024-48887** Critical vulnerability in FortiSwitch GUI (CVSS 9.3) Unauthenticated attackers can remotely change admin passwords. Download the alert: https://t.co/DTzhZJqbLJ Join the CERT group: https://t.co/dXZWcdoewE 1/3 https://t.co/hfR6sYz3a7
@cert_tg
9 Apr 2025
29 Impressions
0 Retweets
1 Like
0 Bookmarks
1 Reply
0 Quotes
🚨 CVE-2024-48887 — Critical FortiSwitch flaw (CVSS 9.3) Unauthenticated attackers can change admin passwords via the GUI. Notes: - FortiSwitch 6.4.0 → 7.6.0 - Patch now. - Workaround: Disable HTTP/HTTPS from administrative interfaces. Discovered internally by https://t.
@modat_magnify
9 Apr 2025
66 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-48887 — Critical FortiSwitch flaw (CVSS 9.3) Unauthenticated attackers can change admin passwords via the GUI. Impacted: - FortiSwitch 6.4.0 → 7.6.0 - Patch now. - Workaround: Disable HTTP/HTTPS from administrative interfaces. Discovered internally by https:/
@modat_magnify
9 Apr 2025
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Fortinet has issued updates for a critical #flaw in FortiSwitch (CVE-2024-48887, CVSS 9.3) that could let attackers change admin passwords remotely via crafted requests. Users are advised to apply the updates promptly☝️🛡️ #vulnerability https://t.co/V4ccnCW5pw
@manuelbissey
9 Apr 2025
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Critical vulnerability (CVE-2024-48887) found in Fortinet FortiSwitch GUI—unauthenticated attackers can change admin passwords remotely. CVSS score: 9.8 🚨 Read the full details: https://t.co/EgZLbyulXf #CyberSecurity #Fortinet #CVE202448887
@threatsbank
9 Apr 2025
39 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Threat Alert: Fortinet Warns of Multiple Vulnerabilities in FortiAnalyzer, FortiManager, &amp- CVE-2024-48887 Severity: 🔴 High Maturity: 🧨 Trending Learn more: https://t.co/Xoqs2rWVzq #CyberSecurity #ThreatIntel #InfoSec
@fletch_ai
9 Apr 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨Alert🚨 CVE-2024-48887: A unverified password change vulnerability in Fortinet FortiSwitch GUI 📊 2.7K+ Services are found on the https://t.co/ysWb28Crld yearly. 🔗Hunter Link:https://t.co/H3CFyeK5eO 👇Query HUNTER : https://t.co/q9rtuGgxk7="FortiSwitch" FOFA : https://t.co/uxk
@HunterMapping
9 Apr 2025
4256 Impressions
27 Retweets
71 Likes
37 Bookmarks
0 Replies
1 Quote
An extremely critical vulnerability, tracked as CVE-2024-48887 CVSS 9.3 🚨, has been discovered in the FortiSwitch GUI. This unverified password change flaw [CWE-620] could allow a remote, unauthenticated attacker to modify administrator passwords by sending a specially crafted h
@cytexsmb
8 Apr 2025
353 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
2 Quotes
⚠️ Vulnerability Alert: Fortinet FortiSwitch Unverified Password Change Flaw 📅 Timeline: Disclosure: 2024-01-14, Patch: 2025-04-08 🆔 CVE: [CVE-2024-48887](https://t.co/kWCEW2JdZC) 📊 BaseScore: 9.3 📏 CVSS Metrics: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvssSeverity:
@syedaquib77
8 Apr 2025
61 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical alert for Fortinet users! A 9.3 CVSS flaw (CVE-2024-48887) in FortiSwitch lets hackers remotely change admin passwords — no login needed. 🔧 Fix it: Upgrade ASAP (7.6.1+, 7.4.5+, 7.2.9+, 7.0.11+, 6.4.15+) ⚡ No exploits yet—but Fortinet bugs have been weaponized http
@TheHackersNews
8 Apr 2025
29108 Impressions
127 Retweets
219 Likes
55 Bookmarks
5 Replies
9 Quotes
CVE-2024-48887 A unverified password change vulnerability in Fortinet FortiSwitch GUI may allow a remote unauthenticated attacker to change admin passwords via a specially crafted … https://t.co/8ZSLMPM5PJ
@CVEnew
8 Apr 2025
232 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
フォーティネット社がFortiAnalyzer, FortiManager, FortiOS, FortiProxy, FortiVoice, FortiWeb, FortiSwitch等で複数の脆弱性を修正。FG-IR-24-435 (CVE-2024-48887)はFortiSwitchのHTTP/HTTPS管理IF経由で、認証無しで管理者パスワードを変更できる重大(Critical)なもの。 https://t.co/qJc0dy73EI
@__kokumoto
8 Apr 2025
5417 Impressions
31 Retweets
79 Likes
23 Bookmarks
1 Reply
5 Quotes