CVE-2022-35849

7.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary operating system commands on FortiADC devices by exploiting improper input sanitization in the management interface. Attackers can gain unauthorized command execution through specially crafted arguments to existing commands. Affected users include organizations running vulnerable FortiADC versions with authenticated management access.

💻 Affected Systems

Products:
  • FortiADC
Versions: 7.1.0 through 7.1.1, 7.0.0 through 7.0.3, 6.2.0 through 6.2.5, 6.1.0 all versions
Operating Systems: FortiOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the management interface. All configurations with vulnerable versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands with system privileges, potentially leading to data theft, lateral movement, or deployment of persistent malware.

🟠

Likely Case

Authenticated attackers with management interface access can execute limited commands to disrupt services, modify configurations, or gain initial foothold for further exploitation.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the FortiADC device itself without lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the management interface. The vulnerability is in command argument handling, making exploitation straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.1.2, 7.0.4, 6.2.6, 6.1.1

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-22-310

Restart Required: Yes

Instructions:

1. Download the appropriate firmware version from Fortinet support portal. 2. Backup current configuration. 3. Upload and install the firmware update via web interface or CLI. 4. Reboot the device. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Management Interface Access

all

Limit access to FortiADC management interface to trusted IP addresses only

config system interface
edit <interface_name>
set allowaccess https ssh
set trustedhost <trusted_ip_range>
end

Implement Network Segmentation

all

Isolate FortiADC management interface on separate VLAN with strict firewall rules

🧯 If You Can't Patch

  • Implement strict access controls to limit management interface access to authorized administrators only
  • Monitor management interface logs for unusual command execution patterns

🔍 How to Verify

Check if Vulnerable:

Check FortiADC firmware version via web interface (System > Dashboard) or CLI command 'get system status'

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify firmware version is 7.1.2, 7.0.4, 6.2.6, or 6.1.1 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in management logs
  • Multiple failed authentication attempts followed by successful login
  • Commands with unusual arguments or special characters

Network Indicators:

  • Unusual outbound connections from FortiADC management interface
  • Traffic patterns inconsistent with normal administrative activities

SIEM Query:

source="fortiadc" AND (event_type="command_execution" OR event_type="admin_login") AND (command="*[;|&]*" OR user="*unusual*" OR src_ip="*untrusted*")

🔗 References

📤 Share & Export