CVE-2021-26110

7.8 HIGH

📋 TL;DR

This vulnerability allows authenticated low-privileged attackers to escalate their privileges to super_admin on affected Fortinet devices. Attackers can exploit improper access control in the autod daemon via crafted CLI scripts. Affected systems include FortiOS versions 7.0.0, 6.4.6 and below, 6.2.9 and below, 6.0.12 and below, and FortiProxy versions 2.0.1 and below, 1.2.9 and below.

💻 Affected Systems

Products:
  • FortiOS
  • FortiProxy
Versions: FortiOS: 7.0.0, 6.4.6 and below, 6.2.9 and below, 6.0.12 and below; FortiProxy: 2.0.1 and below, 1.2.9 and below
Operating Systems: Fortinet proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires fabric automation CLI script and auto-script features to be configured, but these are commonly used features.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with super_admin privileges, allowing full control over network security policies, user accounts, and device configuration.

🟠

Likely Case

Privilege escalation from low-privileged user to administrative access, enabling unauthorized configuration changes and potential lateral movement.

🟢

If Mitigated

Limited to authenticated users only, with proper access controls preventing privilege escalation attempts.

🌐 Internet-Facing: MEDIUM - Requires authenticated access, but internet-facing management interfaces could be targeted.
🏢 Internal Only: HIGH - Internal attackers with low privileges can escalate to full administrative control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and specific configuration of automation features. No public exploit code available at time of advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiOS 7.0.1, 6.4.7, 6.2.10, 6.0.13; FortiProxy 2.0.2, 1.2.10

Vendor Advisory: https://fortiguard.com/advisory/FG-IR-20-131

Restart Required: Yes

Instructions:

1. Download appropriate firmware version from Fortinet support portal. 2. Backup current configuration. 3. Upload and install firmware update via web interface or CLI. 4. Reboot device after installation.

🔧 Temporary Workarounds

Restrict automation script access

all

Limit access to fabric automation and auto-script features to trusted administrators only.

config system admin
edit [username]
set accprofile "prof_admin"
end

Disable unnecessary automation features

all

Disable fabric automation CLI script and auto-script features if not required for operations.

config system auto-script
set status disable
end

🧯 If You Can't Patch

  • Implement strict access controls and monitor for privilege escalation attempts
  • Segment network to limit lateral movement from compromised devices

🔍 How to Verify

Check if Vulnerable:

Check FortiOS/FortiProxy version via CLI: 'get system status' or web interface System > Dashboard

Check Version:

get system status

Verify Fix Applied:

Verify version is patched: 'get system status' should show version 7.0.1+, 6.4.7+, 6.2.10+, 6.0.13+ for FortiOS or 2.0.2+, 1.2.10+ for FortiProxy

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events
  • Multiple failed authentication attempts followed by successful admin access
  • Changes to automation script configurations

Network Indicators:

  • Unexpected administrative access from non-admin accounts
  • Unusual CLI script execution patterns

SIEM Query:

source="fortigate" AND (event_type="admin_login" OR event_type="config_change") AND user="low_privilege_user"

🔗 References

📤 Share & Export