CVE-2022-33877

7.0 HIGH

📋 TL;DR

This vulnerability allows a local authenticated attacker to modify files in the FortiClient or FortiConverter installation folder when installed in an insecure location. It affects Windows installations of FortiClient versions 7.0.0-7.0.6 and 6.4.0-6.4.8, and FortiConverter versions 6.2.0-6.2.1, 7.0.0, and all 6.0.0 versions.

💻 Affected Systems

Products:
  • FortiClient
  • FortiConverter
Versions: FortiClient 7.0.0-7.0.6, 6.4.0-6.4.8; FortiConverter 6.2.0-6.2.1, 7.0.0, all 6.0.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when installed in insecure folders (e.g., user-writable directories). Default Program Files installation may be secure.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains SYSTEM privileges by replacing legitimate executables with malicious ones, leading to complete system compromise.

🟠

Likely Case

Attacker escalates privileges to modify configuration files or install malware within the application context.

🟢

If Mitigated

Limited impact if installed in secure folder with proper permissions, restricting file tampering.

🌐 Internet-Facing: LOW - Requires local access and authentication, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit to escalate privileges or tamper with security software.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local authenticated access and insecure installation folder. Simple file replacement attack.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiClient 7.0.7+, 6.4.9+; FortiConverter 7.0.1+, 6.2.2+

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-22-229

Restart Required: Yes

Instructions:

1. Download latest version from Fortinet support portal. 2. Uninstall vulnerable version. 3. Install patched version. 4. Restart system.

🔧 Temporary Workarounds

Secure Installation Folder

windows

Reinstall application to secure folder (e.g., Program Files) with proper permissions.

Uninstall current version
Reinstall to C:\Program Files\Fortinet\

Restrict Folder Permissions

windows

Modify installation folder permissions to remove write access for non-administrative users.

icacls "C:\Path\To\Installation" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Monitor installation folder for unauthorized file modifications using file integrity monitoring.
  • Restrict local user access to systems running vulnerable versions.

🔍 How to Verify

Check if Vulnerable:

Check installed version via Control Panel > Programs > Programs and Features, or run 'wmic product get name,version' in command prompt.

Check Version:

wmic product where "name like 'Forti%'" get name,version

Verify Fix Applied:

Verify version is 7.0.7+ or 6.4.9+ for FortiClient, or 7.0.1+ or 6.2.2+ for FortiConverter.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing file modifications in Fortinet installation folders
  • Unexpected process execution from Fortinet directories

Network Indicators:

  • None - local attack only

SIEM Query:

EventID=4663 AND ObjectName LIKE '%Fortinet%' AND Accesses='WriteData'

🔗 References

📤 Share & Export