ADVISORY!

TLP : CLEAR

Date : 22/03/2024

REF NO : CERT / 2024/03/22

Fortinet Products Multiple Vulnerabilities

Severity Level: High

Components Affected

  • FortiClientEMS version 7.0.1 through 7.0.10
  • FortiClientEMS version 7.2.0 through 7.2.2
  • FortiClientEMS 6.0 all versions
  • FortiClientEMS 6.2 all versions
  • FortiClientEMS 6.4 all versions
  • FortiClientEMS version 7.0.0 through 7.0.10
  • FortiClientEMS version 7.2.0 through 7.2.2
  • FortiOS version 6.2.0 through 6.2.15
  • FortiOS version 6.4.0 through 6.4.14
  • FortiOS version 7.0.0 through 7.0.12
  • FortiOS version 7.0.1 through 7.0.13
  • FortiOS version 7.2.0 through 7.2.6
  • FortiOS version 7.4.0 through 7.4.1
  • FortiProxy version 2.0.0 through 2.0.13
  • FortiProxy version 7.0.0 through 7.0.14
  • FortiProxy version 7.2.0 through 7.2.8
  • FortiProxy version 7.4.0 through 7.4.2

Overview

Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, elevation of privilege and security restriction bypass on the targeted system

Description

Several critical vulnerabilities have been identified across various Fortinet products, including FortiOS and FortiProxy, posing significant security risks to users. These vulnerabilities range from authorization bypass and improper authentication to SQL injection and buffer overflow attacks. Specifically, an authorization bypass vulnerability in FortiOS and FortiProxy versions allows authenticated attackers to manipulate URLs to gain unauthorized access to another user’s bookmarks. Additionally, FortiClientEMS is susceptible to SQL injection attacks, enabling unauthorized execution of code or commands through specially crafted packets. Furthermore, an improper authentication flaw in FortiOS, particularly when configured with FortiAuthenticator in HA mode, permits readonly users to escalate privileges to read-write access via successive login attempts. Moreover, both FortiOS and FortiProxy are susceptible to stack-based buffer overflow and out-of-bounds write vulnerabilities, which could be exploited by attackers to execute unauthorized code or commands by sending specially crafted HTTP requests. These vulnerabilities collectively highlight the urgent need for users to apply patches and updates provided by Fortinet to mitigate these security risks and safeguard their systems against potential exploitation.

Impact

  • Security Restriction Bypass
  • Remote Code Execution
  • Elevation of Privilege

Solution/ Workarounds

Reference

Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.

Sri Lanka Computer Emergency Readiness Team | Coordination Centre

Copyright © 2023 SRI LANKA CERT | CC