CVE-2020-9295

4.7 MEDIUM

📋 TL;DR

This vulnerability affects Fortinet's antivirus engine in FortiOS and FortiClient, causing delayed detection of malicious files within malformed RAR archives. Attackers could bypass initial scanning to deliver malware. Affected users include those running vulnerable FortiOS 6.2/6.4 or FortiClient 6.2 with outdated AV engine versions.

💻 Affected Systems

Products:
  • FortiOS
  • FortiClient
Versions: FortiOS 6.2 with AV engine ≤6.00142, FortiOS 6.4 with AV engine ≤6.00144, FortiClient 6.2 with AV engine ≤6.00137
Operating Systems: All supported OS for Fortinet products
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the AV engine; default configurations without Virus Outbreak Prevention enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malware delivery bypassing initial AV scanning, leading to system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Temporary evasion of antivirus detection until file extraction triggers real-time scanning or Virus Outbreak Prevention.

🟢

If Mitigated

Minimal impact if Virus Outbreak Prevention is enabled on FortiGate or real-time scanning catches files upon extraction.

🌐 Internet-Facing: MEDIUM - Exploitable via email attachments or web downloads targeting internet-facing systems.
🏢 Internal Only: MEDIUM - Internal users could be targeted via malicious archives in internal communications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Requires crafting malformed RAR archives with malicious content.

Exploitation involves delivering specially crafted RAR archives; no authentication needed if user interacts with the archive.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update AV engine to FortiOS 6.2 with engine >6.00142, FortiOS 6.4 with engine >6.00144, FortiClient 6.2 with engine >6.00137

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-20-037

Restart Required: No

Instructions:

1. Access Fortinet support portal. 2. Download latest AV engine updates. 3. Apply updates via FortiOS/FortiClient management interface. 4. Verify engine version post-update.

🔧 Temporary Workarounds

Enable Virus Outbreak Prevention

all

Activates additional scanning on FortiGate to detect malicious archives.

config antivirus settings
set outbreak-prevention enable

🧯 If You Can't Patch

  • Enable real-time scanning and Virus Outbreak Prevention to catch malicious files upon extraction.
  • Implement network segmentation and user awareness training to reduce risk from malicious archives.

🔍 How to Verify

Check if Vulnerable:

Check AV engine version in FortiOS/FortiClient interface: FortiOS 6.2 ≤6.00142, 6.4 ≤6.00144, FortiClient 6.2 ≤6.00137.

Check Version:

execute show system fortiguard (FortiOS) or check About section (FortiClient)

Verify Fix Applied:

Confirm AV engine version exceeds vulnerable thresholds after update.

📡 Detection & Monitoring

Log Indicators:

  • Log entries for AV engine updates, failed archive scans, or Virus Outbreak Prevention alerts.

Network Indicators:

  • Unusual RAR archive downloads or email attachments triggering AV bypass attempts.

SIEM Query:

source="fortigate" AND (event="virus" OR event="outbreak") AND archive_type="RAR"

🔗 References

📤 Share & Export