CVE-2022-27487

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated remote attackers to make unauthorized API calls on Fortinet FortiSandbox and FortiDeceptor systems. Attackers can bypass intended privilege controls via crafted HTTP/HTTPS requests, potentially gaining elevated access. Organizations running affected versions of these Fortinet security products are at risk.

💻 Affected Systems

Products:
  • Fortinet FortiSandbox
  • Fortinet FortiDeceptor
Versions: FortiSandbox: 4.2.0-4.2.2, 4.0.0-4.0.2, <3.2.3; FortiDeceptor: 4.1.0, 4.0.0-4.0.2, <3.3.3
Operating Systems: FortiOS-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access but default configurations may be vulnerable. Both HTTP and HTTPS interfaces are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands, exfiltrate sensitive data, modify configurations, or disable security controls entirely.

🟠

Likely Case

Unauthorized access to sensitive system information, configuration changes, privilege escalation, or lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation, API access controls, and monitoring in place, potentially only allowing information disclosure.

🌐 Internet-Facing: HIGH - These products are often exposed to manage remote devices or cloud integrations, making them accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this, but requires authenticated access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Once authenticated, crafting HTTP requests to bypass privilege checks is relatively straightforward.

Exploitation requires valid credentials but can be performed remotely via network access to the API interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiSandbox: 4.2.3, 4.0.3, 3.2.3; FortiDeceptor: 4.1.1, 4.0.3, 3.3.3

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-22-056

Restart Required: Yes

Instructions:

1. Download appropriate firmware from Fortinet support portal. 2. Backup current configuration. 3. Apply firmware update via web GUI or CLI. 4. Reboot system. 5. Verify version and functionality.

🔧 Temporary Workarounds

Restrict API Access

all

Limit network access to FortiSandbox/FortiDeceptor management interfaces to trusted IP addresses only.

# Configure firewall rules to restrict access to management IP/ports
# Example: iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
# iptables -A INPUT -p tcp --dport 443 -j DROP

Enforce Strong Authentication

all

Implement multi-factor authentication and strong password policies for all administrative accounts.

# Enable MFA in Fortinet admin settings
# Configure password complexity requirements

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FortiSandbox/FortiDeceptor from critical systems
  • Enable detailed API logging and monitor for unusual authentication patterns or privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check system version via web GUI (System > Dashboard) or CLI command 'get system status' and compare against affected versions.

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify version is updated to patched versions: FortiSandbox ≥4.2.3, ≥4.0.3, or ≥3.2.3; FortiDeceptor ≥4.1.1, ≥4.0.3, or ≥3.3.3.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API calls from authenticated users
  • Privilege escalation attempts in audit logs
  • Failed authorization checks followed by successful privileged operations

Network Indicators:

  • Unusual HTTP/HTTPS traffic patterns to management interfaces
  • API requests bypassing normal authentication flows

SIEM Query:

source="fortisandbox" OR source="fortideceptor" AND (event_type="api_call" AND authorization="failed" AND result="success")

🔗 References

📤 Share & Export