FortiManager Critical CVE-2024-47575 “FortiJump” Allows RCE
Common Information
Type Value
UUID 8f6615fb-515d-42e1-94c9-b3f42e10af10
Fingerprint 2d37a196ab198b8d
Analysis status DONE
Considered CTI value 1
Text language
Published Oct. 25, 2024, 12:37 a.m.
Added to db Oct. 25, 2024, 6:42 a.m.
Last updated Nov. 17, 2024, 12:53 p.m.
Headline FortiManager Critical CVE-2024-47575 “FortiJump” Allows RCE
Title FortiManager Critical CVE-2024-47575 “FortiJump” Allows RCE
Detected Hints/Tags/Attributes 29/2/16
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 205 Kudelski Security Research https://research.kudelskisecurity.com/feed/ 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details CVE 87
cve-2024-47575
Details Domain 65
www.fortiguard.com
Details Domain 39
www.helpnetsecurity.com
Details Domain 67
www.tenable.com
Details File 4
revinfo.db
Details File 7
devices.txt
Details File 4
global.db
Details Mandiant Uncategorized Groups 23
UNC5820
Details Url 5
https://www.fortiguard.com/psirt/fg-ir-24-423
Details Url 1
https://www.helpnetsecurity.com/2024/10/24/cve-2024-47575
Details Url 1
https://www.rapid7.com/blog/post/2024/10/23/etr-fortinet-fortimanager-cve-2024-47575-exploited-in-zero-day-attacks
Details Url 3
https://www.tenable.com/blog/cve-2024-47575-faq-about-fortijump-zero-day-in-fortimanager-fortimanager-cloud
Details Url 1
https://www.tenable.com/plugins/nessus/209559
Details Url 1
https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-critical-fortimanager-flaw-used-in-zero-day-attacks
Details Url 1
https://www.bleepingcomputer.com/news/security/mandiant-says-new-fortinet-fortimanager-flaw-has-been-exploited-since-june
Details Url 4
https://cloud.google.com/blog/topics/threat-intelligence/fortimanager-zero-day-exploitation-cve-2024-47575