Skip to main content

This critical vulnerability could lead to unauthenticated arbitrary code execution

Summary

This critical vulnerability could lead to unauthenticated arbitrary code execution

Affected platforms

The following platforms are known to be affected:

Fortinet FortiAnalyzerFortiAnalyzer models 1000E, 1000F, 2000E, 3000E, 3000F, 3000G, 3500E, 3500F, 3500G, 3700F, 3700G, 3900E with the following feature enabled (FortiManager on FortiAnalyzer): and at least one interface with fgfm service enabled are also impacted

Threat details

Introduction

Fortinet has released a security advisory to address a critical vulnerability in the FortiManager fgfmd daemon. 

CVE-2024-47575 is a ‘missing authentication for critical function’ vulnerability with a CVSSv3 score of 9.8. A remote unauthenticated attacker could send a specially crafted request to execute arbitrary code (ACE) or commands. 

Threat updates

Remediation advice

Affected organisations must review Fortinet PSIRT Advisory FG-IR-24-423, apply security updates, and follow Fortinet's recovery guidance, which has been listed below. 

If organisations are unable to immediately apply security updates, workarounds are outlined in the advisory FG-IR-24-423 as a temporary measure.

Remediation steps

Indicators of compromise

type=event,subtype=dvm,pri=information,desc="Device,manager,generic,information,log",user="device,...",msg="Unregistered device localhost add succeeded" device="localhost" adom="FortiManager" session_id=0 operation="Add device" performed_on="localhost" changes="Unregistered device localhost add succeeded"

type=event,subtype=dvm,pri=notice,desc="Device,Manager,dvm,log,at,notice,level",user="System",userfrom="",msg="" adom="root" session_id=0 operation="Modify device" performed_on="localhost" changes="Edited device settings (SN FMG-VMTM23017412)"

Important note: The two entries above may keep being logged even on an up-to-date, patched system (such as FortiManager 7.4.5) - in which case they are not IoCs anymore, but rather indicators of a (failed) attempt to compromise the system. The fix is not meant to prevent adding unauthorised devices (which these log entries are indicative of, and which can legitimately happen in a deployment context), it is meant to prevent unauthorised devices from sending exploit commands.

45.32.41.202
104.238.141.143
158.247.199.37
45.32.63.2
80.66.196.199
104.238.141.143
158.247.199.37
195.85.114.78
172.232.167.68

FMG-VMTM23017412
FMG-VMTM19008093

Files

/tmp/.tm
/var/tmp/.tm

Definitive source of threat updates

CVE Vulnerabilities

Last edited: 31 October 2024 2:21 pm