CVE-2022-38375

9.1 CRITICAL

📋 TL;DR

CVE-2022-38375 is an improper authorization vulnerability in Fortinet FortiNAC that allows unauthenticated attackers to perform administrative operations via crafted HTTP POST requests. This affects FortiNAC versions 9.4.0 through 9.4.1 and versions before 9.2.6, potentially giving attackers administrative control over the FortiNAC instance.

💻 Affected Systems

Products:
  • Fortinet FortiNAC
Versions: 9.4.0 through 9.4.1, and versions before 9.2.6
Operating Systems: Fortinet's proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within affected version ranges are vulnerable by default. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the FortiNAC instance, allowing attackers to modify configurations, create administrative accounts, disable security controls, and potentially pivot to other network systems.

🟠

Likely Case

Attackers gain administrative access to FortiNAC, enabling them to modify network access policies, create backdoor accounts, and disrupt network operations.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to FortiNAC management interfaces.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires only crafted HTTP POST requests, making exploitation straightforward for attackers with network access to the FortiNAC interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.4.2 or 9.2.6 and later

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-22-329

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Fortinet support portal. 2. Backup current configuration. 3. Apply the patch following Fortinet's upgrade procedures. 4. Restart the FortiNAC instance. 5. Verify the version is updated to 9.4.2 or 9.2.6+.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to FortiNAC management interfaces to trusted IP addresses only.

Web Application Firewall

all

Deploy a WAF with rules to block suspicious HTTP POST requests to FortiNAC endpoints.

🧯 If You Can't Patch

  • Isolate FortiNAC management interfaces from untrusted networks using firewall rules.
  • Implement strict network segmentation to limit potential lateral movement if compromised.

🔍 How to Verify

Check if Vulnerable:

Check FortiNAC version via web interface (System > Status) or CLI 'get system status' command.

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify version is 9.4.2 or higher, or 9.2.6 or higher. Test with authorized security assessment tools.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated POST requests to administrative endpoints
  • Unusual administrative actions from unexpected IP addresses
  • Failed authentication attempts followed by successful administrative operations

Network Indicators:

  • HTTP POST requests to FortiNAC administrative endpoints from external/untrusted sources
  • Unusual traffic patterns to FortiNAC management ports

SIEM Query:

source="fortinac" AND (http_method="POST" AND (url_path="/admin/*" OR url_path="/api/*")) AND user="-"

🔗 References

📤 Share & Export