{"id":1229,"date":"2024-10-29T08:00:00","date_gmt":"2024-10-29T15:00:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=1229"},"modified":"2024-10-28T13:13:52","modified_gmt":"2024-10-28T20:13:52","slug":"emerging-threat-fortijump-cve-2024-47575","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/","title":{"rendered":"Emerging Threat: FortiJump (CVE-2024-47575)\u00a0"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What is FortiJump?&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/fortiguard.fortinet.com\/psirt\/FG-IR-24-423\">CVE-2024-47575<\/a>, also known as FortiJump, is a <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-47575\">critical<\/a> (9.8) missing authentication vulnerability affecting critical functions in FortiManager and FortiManager Cloud versions. Threat researcher <a href=\"https:\/\/doublepulsar.com\/burning-zero-days-fortijump-fortimanager-vulnerability-used-by-nation-state-in-espionage-via-msps-c79abec59773\">Kevin Beaumont<\/a> published a blog post on October 22nd, 2024 identifying this vulnerability as a zero day. This vulnerability is separate from <a href=\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-fortinet-fortios-cve-2024-23113\/\">CVE-2024-23113<\/a>, which also affects FortiGate devices.&nbsp;<\/p>\n\n\n\n<p>FortiJump affects the FortiGate to FortiManager (FGFM) protocol, which is used throughout FortiGate and FortiManager deployments to manage FortiGate firewalls, including creating groups, adding devices, installing policy packages, and managing device settings.&nbsp;&nbsp;<\/p>\n\n\n\n<p>A Shodan search reveals approximately 60,000 FGFM assets are externally exposed worldwide, indicating a significant potential scale of exploitation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What assets are affected by FortiJump?<\/h2>\n\n\n\n<p>This vulnerability affects the FortiManager versions below:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>FortiManager 7.6.0<\/li>\n\n\n\n<li>FortiManager 7.4.0 through 7.4.4<\/li>\n\n\n\n<li>FortiManager 7.2.0 through 7.2.7<\/li>\n\n\n\n<li>FortiManager 7.0.0 through 7.0.12<\/li>\n\n\n\n<li>FortiManager 6.4.0 through 6.4.14<\/li>\n\n\n\n<li>FortiManager 6.2.0 through 6.2.12<\/li>\n\n\n\n<li>FortiManager Cloud 7.4.1 through 7.4.4<\/li>\n\n\n\n<li>FortiManager Cloud 7.2.1 through 7.2.7<\/li>\n\n\n\n<li>FortiManager Cloud 7.0.1 through 7.0.12<\/li>\n\n\n\n<li>FortiManager Cloud 6.4 all versions<\/li>\n<\/ul>\n\n\n\n<p>Fortinet also disclosed that FortiAnalyzer models 1000E, 1000F, 2000E, 3000E, 3000F, 3000G, 3500E, 3500F, 3500G, 3700F, 3700G, 3900E with <a href=\"https:\/\/fortiguard.fortinet.com\/psirt\/FG-IR-24-423\">a specific feature enabled<\/a> are vulnerable.&nbsp;<\/p>\n\n\n\n<p>FortiManager Cloud 7.6 is not affected by FortiJump.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is the impact of this vulnerability?&nbsp;<\/h2>\n\n\n\n<p>This flaw takes advantage of several lax security standards in FortiManager, including an issue where FGFM allows unauthorized and unknown devices to register with no authentication. All that is required is a valid certificate, but attackers can reuse certificates from any FortiGate box.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Once registered, attackers can execute arbitrary code or commands, potentially escalating to remote code execution (RCE) or taking over the management of FortiGate firewalls.&nbsp;<\/p>\n\n\n\n<p>This vulnerability poses significant risks because it enables attackers to both enter downstream connections \u2013 moving from FortiManager to internal networks \u2013 but also move upstream, leveraging a compromised FortiGate firewall to jump upwards to the FortiManager connected to it, as well as any other internal networks connected to that FortiManager instance.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is a fix available?&nbsp;<\/h2>\n\n\n\n<p>Fortinet has released patches for some affected versions and suggests migration to a fixed release for others:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>FortiManager 7.6.0: Upgrade to 7.6.1 or above<\/li>\n\n\n\n<li>FortiManager 7.4.0 through 7.4.4: Upgrade to 7.4.5 or above<\/li>\n\n\n\n<li>FortiManager 7.2.0 through 7.2.7: \u200b\u200bUpgrade to 7.2.8 or above<\/li>\n\n\n\n<li>FortiManager 7.0.0 through 7.0.12: Upgrade to 7.0.13 or above<\/li>\n\n\n\n<li>FortiManager 6.4.0 through 6.4.14: Upgrade to 6.4.15 or above<\/li>\n\n\n\n<li>FortiManager 6.2.0 through 6.2.12: Upgrade to 6.2.13 or above<\/li>\n\n\n\n<li>FortiManager Cloud 7.4.1 through 7.4.4: Upgrade to 7.4.5 or above<\/li>\n\n\n\n<li>FortiManager Cloud 7.2.1 through 7.2.7: Upgrade to 7.2.8 or above<\/li>\n\n\n\n<li>FortiManager Cloud 7.0.1 through 7.0.12: Upgrade to 7.0.13 or above<\/li>\n\n\n\n<li>FortiManager Cloud 6.4 all versions: Migrate to a fixed release<\/li>\n<\/ul>\n\n\n\n<p>Because FortiManager Cloud 7.6 is not affected by FortiJump, no action is required.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there any other actions to take?&nbsp;<\/h2>\n\n\n\n<p>Disabling FGFM using the setting fgfm-deny-unknown will prevent unknown devices from registering with FortiManager. Users can also prevent FGFM from presenting to the internet, although this removes its core functionality.&nbsp;<\/p>\n\n\n\n<p>Fortinet has also released a <a href=\"https:\/\/fortiguard.fortinet.com\/psirt\/FG-IR-24-423\">list of potential workarounds<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is FortiJump being actively exploited?&nbsp;<\/h2>\n\n\n\n<p>Researchers report that FortiJump is being actively exploited, although no proof-of-concept (PoC) has been released yet.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there any potential Indicators of Compromise (IOCs)?&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/fortiguard.fortinet.com\/psirt\/FG-IR-24-423\">Fortinet<\/a> has released a list of potential IOCs, including log entries, IP addresses, serial numbers, and files. However, they note that in the case of the log entries, the entries below may continue being logged even after devices are updated, as the fixes prevent unauthorized devices from sending exploit commands, not from being added in the first place. If a fix has been successfully implemented, these logs instead indicate a failed attempt at compromise. Fortinet also notes that file IoCs may not appear in all cases.<\/p>\n\n\n\n<div class=\"card\">\n\n\n\n<h6>Log entries<\/h6>\n\n\n\n<ul class=\"compact\">\n<li>type=event,subtype=dvm,pri=information,desc=&#8221;Device,manager,generic,information,log&#8221;,user=&#8221;device,&#8230;&#8221;,msg=&#8221;Unregistered device localhost add succeeded&#8221; device=&#8221;localhost&#8221; adom=&#8221;FortiManager&#8221; session_id=0 operation=&#8221;Add device&#8221; performed_on=&#8221;localhost&#8221; changes=&#8221;Unregistered device localhost add succeeded&#8221;<\/li>\n\n\n\n<li>type=event,subtype=dvm,pri=notice,desc=&#8221;Device,Manager,dvm,log,at,notice,level&#8221;,user=&#8221;System&#8221;,userfrom=&#8221;&#8221;,msg=&#8221;&#8221; adom=&#8221;root&#8221; session_id=0 operation=&#8221;Modify device&#8221; performed_on=&#8221;localhost&#8221; changes=&#8221;Edited device settings (SN FMG-VMTM23017412)\u201d<\/li>\n<\/ul>\n\n\n\n<h6 class=\"wp-block-heading\">IP addresses<\/h6>\n\n\n\n<ul class=\"compact\">\n<li>45.32.41.202<\/li>\n\n\n\n<li>104.238.141.143<\/li>\n\n\n\n<li>158.247.199.37<\/li>\n\n\n\n<li>45.32.63.2\u00a0<\/li>\n\n\n\n<li>195.85.114.78 (as reported by Mandiant)<\/li>\n<\/ul>\n\n\n\n<h6 class=\"wp-block-heading\">Serial Number<\/h6>\n\n\n\n<ul class=\"wp-block-list\">\n<li>FMG-VMTM23017412<\/li>\n<\/ul>\n\n\n\n<h6 class=\"wp-block-heading\">Files<\/h6>\n\n\n\n<ul class=\"compact\">\n<li>\/tmp\/.tm<\/li>\n<li>\/var\/tmp\/.tm<\/li>\n<\/ul>\n\n\n\n<\/div class=\"card\">\n\n\n\n<h2 class=\"wp-block-heading\">How is CyCognito helping customers identify assets vulnerable to FortiJump?\u00a0<\/h2>\n\n\n\n<p>CyCognito is actively researching an active detection method for this vulnerability. As of October 28th, users can check if their assets are potentially vulnerable using provided filters and lists in the CyCognito platform. All customers also have access to an in-platform emerging threat announcement.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"755\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/FortiJump-Figure-1-CVE-2024-47575-1280x755.webp\" alt=\"\" class=\"wp-image-1230\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/FortiJump-Figure-1-CVE-2024-47575-1280x755.webp 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/FortiJump-Figure-1-CVE-2024-47575-512x302.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/FortiJump-Figure-1-CVE-2024-47575-768x453.webp 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/FortiJump-Figure-1-CVE-2024-47575-1536x905.webp 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/FortiJump-Figure-1-CVE-2024-47575.webp 1944w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p class=\"caption\">Figure 1: The alert sent by CyCognito for these issues.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can CyCognito help your organization?&nbsp;<\/h2>\n\n\n\n<p>CyCognito is an exposure management platform that reduces risk by discovering, testing, and prioritizing security issues. The platform scans billions of websites, cloud applications, and APIs and uses advanced AI to identify the most critical risks and guide remediation. Emerging companies, government agencies and Fortune 500 organizations rely on CyCognito to secure and protect from growing threats. Want to see how it works? Check out our website and explore our platform with a self-guided, interactive <a href=\"https:\/\/app.getreprise.com\/launch\/V6Waa5X\">dashboard product tour<\/a>. To learn how CyCognito can help you understand your external attack surface and exposed risks, please visit our <a href=\"https:\/\/www.cycognito.com\/contact\/\">Contact Us page<\/a> to schedule a demo.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE-2024-47575 (FortiJump) is a missing authentication vulnerability affecting critical functions in FortiManager and FortiManager Cloud versions. Approximately 60,000 assets are externally exposed worldwide. All CyCognito customers have access to an in-platform emerging threat announcement and methods to identify potentially vulnerable assets.   <\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[58,203,202,57],"class_list":["post-1229","post","type-post","status-publish","format-standard","hentry","category-research","tag-cve","tag-fortijump","tag-fortinet","tag-vulnerability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Threat: FortiJump (CVE-2024-47575)\u00a0 | CyCognito Blog<\/title>\n<meta name=\"description\" content=\"CVE-2024-47575 affects critical functions in Fortinet FortiManager. CyCognito released an in-platform pop-up and list of potentially vulnerable assets.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Threat: FortiJump (CVE-2024-47575)\" \/>\n<meta property=\"og:description\" content=\"CVE-2024-47575 affects critical functions in Fortinet FortiManager. CyCognito released an in-platform pop-up and list of potentially vulnerable assets.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-29T15:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-10-29-2400x1256-email.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Emma Zaballos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emma Zaballos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/\"},\"author\":{\"name\":\"Emma Zaballos\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58\"},\"headline\":\"Emerging Threat: FortiJump (CVE-2024-47575)\u00a0\",\"datePublished\":\"2024-10-29T15:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/\"},\"wordCount\":844,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/FortiJump-Figure-1-CVE-2024-47575-1280x755.webp\",\"keywords\":[\"CVE\",\"FortiJump\",\"Fortinet\",\"Vulnerability\"],\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/\",\"name\":\"Emerging Threat: FortiJump (CVE-2024-47575)\u00a0 | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/FortiJump-Figure-1-CVE-2024-47575-1280x755.webp\",\"datePublished\":\"2024-10-29T15:00:00+00:00\",\"description\":\"CVE-2024-47575 affects critical functions in Fortinet FortiManager. CyCognito released an in-platform pop-up and list of potentially vulnerable assets.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/FortiJump-Figure-1-CVE-2024-47575.webp\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/FortiJump-Figure-1-CVE-2024-47575.webp\",\"width\":1944,\"height\":1146},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Threat: FortiJump (CVE-2024-47575)\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58\",\"name\":\"Emma Zaballos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g\",\"caption\":\"Emma Zaballos\"},\"description\":\"Product Marketing Manager\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/emma-zaballos\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Threat: FortiJump (CVE-2024-47575)\u00a0 | CyCognito Blog","description":"CVE-2024-47575 affects critical functions in Fortinet FortiManager. CyCognito released an in-platform pop-up and list of potentially vulnerable assets.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Threat: FortiJump (CVE-2024-47575)","og_description":"CVE-2024-47575 affects critical functions in Fortinet FortiManager. CyCognito released an in-platform pop-up and list of potentially vulnerable assets.","og_url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/","og_site_name":"CyCognito Blog","article_published_time":"2024-10-29T15:00:00+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-10-29-2400x1256-email.png","type":"image\/png"}],"author":"Emma Zaballos","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Emma Zaballos","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/"},"author":{"name":"Emma Zaballos","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58"},"headline":"Emerging Threat: FortiJump (CVE-2024-47575)\u00a0","datePublished":"2024-10-29T15:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/"},"wordCount":844,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/FortiJump-Figure-1-CVE-2024-47575-1280x755.webp","keywords":["CVE","FortiJump","Fortinet","Vulnerability"],"articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/","url":"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/","name":"Emerging Threat: FortiJump (CVE-2024-47575)\u00a0 | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/FortiJump-Figure-1-CVE-2024-47575-1280x755.webp","datePublished":"2024-10-29T15:00:00+00:00","description":"CVE-2024-47575 affects critical functions in Fortinet FortiManager. CyCognito released an in-platform pop-up and list of potentially vulnerable assets.","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/FortiJump-Figure-1-CVE-2024-47575.webp","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/FortiJump-Figure-1-CVE-2024-47575.webp","width":1944,"height":1146},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/emerging-threat-fortijump-cve-2024-47575\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emerging Threat: FortiJump (CVE-2024-47575)\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58","name":"Emma Zaballos","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g","caption":"Emma Zaballos"},"description":"Product Marketing Manager","url":"https:\/\/www.cycognito.com\/blog\/author\/emma-zaballos\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=1229"}],"version-history":[{"count":9,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1229\/revisions"}],"predecessor-version":[{"id":1245,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1229\/revisions\/1245"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=1229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=1229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=1229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}