Latest FortiSwitch Manager vulnerability: CVE-2025-49201 #
Fortinet has issued an advisory for a weak authentication vulnerability in the GUI component of certain versions of Fortinet FortiSwitch Manager. This vulnerability may allow a remote, unauthenticated adversary to execute unauthorized code or commands through specially crafted HTTP requests. The vulnerability, designated CVE-2025-49201, is rated high with a base CVSS score of 7.4.
The following versions are affected
- FortiSwitch Manager 7.2 versions 7.2.0 through 7.2.4
What is Fortinet FortiSwitch Manager? #
Fortinet FortiSwitch Manager is a centralized management platform that enables teams to configure, manage, and monitor all of their FortiSwitch Ethernet switches from a unified console.
What is the impact? #
Successful exploitation of the vulnerability would allow an adversary to execute arbitrary code on the vulnerable system, potentially leading to complete system compromise.
Are updates or workarounds available? #
Upgrade affected systems to the new versions
- FortiSwitch Manager 7.2 upgrade to version 7.2.5 or later
How to find potentially vulnerable systems with runZero #
From the Software Inventory, use the following query to locate potentially impacted assets:
vendor:=Fortinet product:="FortiSwitchManager"
April 2025: CVE-2024-48887 #
Fortinet has issued an advisory (see FortiGuard) for its Fortinet FortiSwitch product. An unauthenticated user may be able to exploit a vulnerability in the web administration interface to change the password for an administrative account. Successfully exploiting this vulnerability would allow an attacker to gain administrative privileges on the vulnerable device.
This vulnerability has been designated CVE-2024-48887 and has been assigned a CVSS score of 9.3 (extremely critical).
What is the impact? #
This vulnerability would allow an attacker to gain administrative privileges on the vulnerable device.
Are updates or workarounds available? #
The vendor has released updates to address this issue, and the vendor advises users to update as quickly as possible. Mitigation strategies include disabling the affected web administrative interface.
How to find potentially vulnerable systems with runZero #
From the Asset Inventory, use the following query to locate systems running potentially vulnerable software:
os:FortiSwitchOS AND ((osversion:>=7.6.0 AND osversion:<7.6.1) OR (osversion:>=7.4.0 AND osversion:<7.4.4) OR (osversion:>=7.2.0 AND osversion:<7.2.8) OR (osversion:>=7.0.0 AND osversion:<7.0.10) OR (osversion:>=6.4.0 AND osversion:<6.4.14))