{"uuid": "a21b2bae-0322-4aee-858d-71894a5f9448", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-48887", "type": "seen", "source": "https://t.me/cybersecplayground/166", "content": "\ud83d\udea8 Alert: CVE-2024-48887 \u2014 Fortinet FortiSwitch Critical Vulnerability \ud83d\udea8\n\nA password change vulnerability in the FortiSwitch GUI allows unauthorized modifications without verification.\n\n\ud83d\udd13 This opens the door for attackers to take over admin accounts and gain full control over network switches!\n\n\ud83d\udcca Affected Devices: Over 2.7K+ services are exposed on the internet yearly.\n\n\ud83d\udd0d Hunter Link\n\n\ud83d\udccc OSINT Queries:\n\nHunter: product.name=\"FortiSwitch\"\nFOFA: app=\"FortiSwitch\"\nShodan: http.title:\"FortiSwitch\"\n\n\ud83d\udcf0 References:\nFortinet Advisory\nSecurity Online Report\n\n\ud83d\udca1 Mitigation:\nUpdate FortiSwitch firmware immediately and restrict GUI access to trusted IPs.\n\n\ud83d\udd10 Stay sharp and stay updated with @cybersecplayground\n\n#Fortinet #FortiSwitch #infosec #OSINT #CVE #hunterhow #cybersecurity #Vulnerability #BugBounty #InfoSecurity #ZeroDay", "creation_timestamp": "2025-04-09T17:01:40.000000Z"}