CVE-2021-32603

8.8 HIGH

📋 TL;DR

This is a server-side request forgery (SSRF) vulnerability in FortiManager and FortiAnalyser GUI that allows authenticated attackers to make unauthorized requests from the vulnerable system. Attackers can potentially access internal files and services that should be restricted. Organizations using affected versions of these Fortinet management platforms are at risk.

💻 Affected Systems

Products:
  • FortiManager
  • FortiAnalyser
Versions: 7.0.0, 6.4.5 and below, 6.2.7 and below, 6.0.11 and below, 5.6.11 and below
Operating Systems: FortiOS-based appliances
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the GUI interface. All default configurations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could access sensitive internal systems, exfiltrate data, or pivot to other network resources by making the vulnerable system proxy requests to internal services.

🟠

Likely Case

Unauthorized access to internal files and services, potentially exposing configuration data, credentials, or other sensitive information stored on the system.

🟢

If Mitigated

Limited impact due to network segmentation, proper authentication controls, and monitoring that detects unusual outbound requests from management systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the GUI. The vulnerability is in the web interface handling of crafted requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions above those listed as affected (check Fortinet advisory for specific fixed versions)

Vendor Advisory: https://fortiguard.com/advisory/FG-IR-21-050

Restart Required: Yes

Instructions:

1. Review Fortinet advisory FG-IR-21-050. 2. Upgrade to patched versions: FortiManager/FortiAnalyser 7.0.1+, 6.4.6+, 6.2.8+, 6.0.12+, or 5.6.12+. 3. Apply updates during maintenance window. 4. Restart services as required.

🔧 Temporary Workarounds

Restrict GUI Access

all

Limit access to FortiManager/FortiAnalyser GUI to trusted IP addresses only

Configure firewall rules to restrict GUI access to management networks

Implement Network Segmentation

all

Isolate management interfaces from general network access

Place FortiManager/FortiAnalyser on dedicated management VLAN

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate management interfaces
  • Enforce strong authentication and monitor for unusual GUI access patterns

🔍 How to Verify

Check if Vulnerable:

Check current FortiManager/FortiAnalyser version via GUI (System > Dashboard) or CLI (get system status)

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify version is above affected ranges: 7.0.1+, 6.4.6+, 6.2.8+, 6.0.12+, or 5.6.12+

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP/HTTPS requests from management system
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unexpected traffic from FortiManager/FortiAnalyser to internal services
  • Requests to internal IPs from management system

SIEM Query:

source="fortimanager" OR source="fortianalyser" AND (http_request OR url_access) AND (dest_ip=internal_range)

🔗 References

📤 Share & Export