CVE-2021-32603
📋 TL;DR
This is a server-side request forgery (SSRF) vulnerability in FortiManager and FortiAnalyser GUI that allows authenticated attackers to make unauthorized requests from the vulnerable system. Attackers can potentially access internal files and services that should be restricted. Organizations using affected versions of these Fortinet management platforms are at risk.
💻 Affected Systems
- FortiManager
- FortiAnalyser
📦 What is this software?
Fortianalyzer by Fortinet
Fortianalyzer by Fortinet
Fortianalyzer by Fortinet
Fortimanager by Fortinet
Fortimanager by Fortinet
Fortimanager by Fortinet
⚠️ Risk & Real-World Impact
Worst Case
An attacker could access sensitive internal systems, exfiltrate data, or pivot to other network resources by making the vulnerable system proxy requests to internal services.
Likely Case
Unauthorized access to internal files and services, potentially exposing configuration data, credentials, or other sensitive information stored on the system.
If Mitigated
Limited impact due to network segmentation, proper authentication controls, and monitoring that detects unusual outbound requests from management systems.
🎯 Exploit Status
Exploitation requires authenticated access to the GUI. The vulnerability is in the web interface handling of crafted requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions above those listed as affected (check Fortinet advisory for specific fixed versions)
Vendor Advisory: https://fortiguard.com/advisory/FG-IR-21-050
Restart Required: Yes
Instructions:
1. Review Fortinet advisory FG-IR-21-050. 2. Upgrade to patched versions: FortiManager/FortiAnalyser 7.0.1+, 6.4.6+, 6.2.8+, 6.0.12+, or 5.6.12+. 3. Apply updates during maintenance window. 4. Restart services as required.
🔧 Temporary Workarounds
Restrict GUI Access
allLimit access to FortiManager/FortiAnalyser GUI to trusted IP addresses only
Configure firewall rules to restrict GUI access to management networks
Implement Network Segmentation
allIsolate management interfaces from general network access
Place FortiManager/FortiAnalyser on dedicated management VLAN
🧯 If You Can't Patch
- Implement strict network segmentation to isolate management interfaces
- Enforce strong authentication and monitor for unusual GUI access patterns
🔍 How to Verify
Check if Vulnerable:
Check current FortiManager/FortiAnalyser version via GUI (System > Dashboard) or CLI (get system status)
Check Version:
get system status | grep Version
Verify Fix Applied:
Verify version is above affected ranges: 7.0.1+, 6.4.6+, 6.2.8+, 6.0.12+, or 5.6.12+
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP/HTTPS requests from management system
- Multiple failed authentication attempts followed by successful login
Network Indicators:
- Unexpected traffic from FortiManager/FortiAnalyser to internal services
- Requests to internal IPs from management system
SIEM Query:
source="fortimanager" OR source="fortianalyser" AND (http_request OR url_access) AND (dest_ip=internal_range)