How to find Fortinet FortiSwitch assets on your network

|
Updated

Latest FortiSwitch Manager vulnerability: CVE-2025-49201 #

Fortinet has issued an advisory for a weak authentication vulnerability in the GUI component of certain versions of Fortinet FortiSwitch Manager. This vulnerability may allow a remote, unauthenticated adversary to execute unauthorized code or commands through specially crafted HTTP requests. The vulnerability, designated CVE-2025-49201, is rated high with a base CVSS score of 7.4.

The following versions are affected

  • FortiSwitch Manager 7.2 versions 7.2.0 through 7.2.4

What is Fortinet FortiSwitch Manager? #

Fortinet FortiSwitch Manager is a centralized management platform that enables teams to configure, manage, and monitor all of their FortiSwitch Ethernet switches from a unified console.

What is the impact? #

Successful exploitation of the vulnerability would allow an adversary to execute arbitrary code on the vulnerable system, potentially leading to complete system compromise.

Are updates or workarounds available? #

Upgrade affected systems to the new versions

  • FortiSwitch Manager 7.2 upgrade to version 7.2.5 or later

How to find potentially vulnerable systems with runZero #

From the Software Inventory, use the following query to locate potentially impacted assets:

vendor:=Fortinet product:="FortiSwitchManager"

April 2025: CVE-2024-48887 #

Fortinet has issued an advisory (see FortiGuard) for its Fortinet FortiSwitch product. An unauthenticated user may be able to exploit a vulnerability in the web administration interface to change the password for an administrative account. Successfully exploiting this vulnerability would allow an attacker to gain administrative privileges on the vulnerable device.

This vulnerability has been designated CVE-2024-48887 and has been assigned a CVSS score of 9.3 (extremely critical).

What is the impact? #

This vulnerability would allow an attacker to gain administrative privileges on the vulnerable device.

Are updates or workarounds available? #

The vendor has released updates to address this issue, and the vendor advises users to update as quickly as possible. Mitigation strategies include disabling the affected web administrative interface.

How to find potentially vulnerable systems with runZero #

From the Asset Inventory, use the following query to locate systems running potentially vulnerable software:

os:FortiSwitchOS AND ((osversion:>=7.6.0 AND osversion:<7.6.1) OR (osversion:>=7.4.0 AND osversion:<7.4.4) OR (osversion:>=7.2.0 AND osversion:<7.2.8) OR (osversion:>=7.0.0 AND osversion:<7.0.10) OR (osversion:>=6.4.0 AND osversion:<6.4.14))

Written by Matthew Kienow

Matthew Kienow is a software engineer and security researcher. Matthew previously worked on the Recog recognition framework, AttackerKB as well as Metasploit's MSF 5 APIs. He has also designed, built, and successfully deployed many secure software solutions; however, often he enjoys breaking them instead. He has presented his research at various security conferences including DerbyCon, Hack In Paris, and CarolinaCon. His research has been cited by CSO, Threatpost and SC Magazine.

More about Matthew Kienow

Written by Rob King

Rob King is the Director of Applied Research at runZero. Over his career Rob has served as a senior researcher with KoreLogic, the architect for TippingPoint DVLabs, and helped get several startups off the ground. Rob helped design SC Magazine's Data Leakage Prevention Product of the Year for 2010, and was awarded the 3Com Innovator of the Year Award in 2009. He has been invited to speak at BlackHat, Shmoocon, SANS Network Security, and USENIX.

More about Rob King
Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.