Unverified password change via set_password endpoint

Summary

An unverified password change vulnerability [CWE-620] in FortiSwitch GUI may allow a remote unauthenticated attacker to modify admin passwords via a specially crafted request.

Version Affected Solution
FortiSwitch 7.6 7.6.0 Upgrade to 7.6.1 or above
FortiSwitch 7.4 7.4.0 through 7.4.4 Upgrade to 7.4.5 or above
FortiSwitch 7.2 7.2.0 through 7.2.8 Upgrade to 7.2.9 or above
FortiSwitch 7.0 7.0.0 through 7.0.10 Upgrade to 7.0.11 or above
FortiSwitch 6.4 6.4.0 through 6.4.14 Upgrade to 6.4.15 or above

Workaround

Disable HTTP/HTTPS Access from administrative interfaces

Configure trusted hosts to limit the hosts that can connect to the system:
config system admin
edit <admin_name>
set {trusthost1 | trusthost2 | trusthost3 | trusthost4 |
trusthost5 | trusthost6 | trusthost7 | trusthost8 | trusthost9
| trusthost10} <address_ipv4mask>
next
end

Acknowledgement

Internally discovered and reported by Daniel Rozeboom of the FortiSwitch web UI development team

Timeline

2025-04-08: Initial publication