CVE-2022-43946
📋 TL;DR
This CVE describes two vulnerabilities in Fortinet FortiClient for Windows: an incorrect permission assignment (CWE-732) and a TOCTOU race condition (CWE-367). Attackers on the same file sharing network can exploit these to execute arbitrary commands via Windows pipes. Affected users are those running vulnerable FortiClient versions on Windows systems connected to file sharing networks.
💻 Affected Systems
- Fortinet FortiClient for Windows
📦 What is this software?
Forticlient by Fortinet
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with attacker gaining SYSTEM privileges and establishing persistence on the compromised machine.
Likely Case
Local privilege escalation allowing attackers to execute arbitrary commands with elevated privileges.
If Mitigated
Limited impact if proper network segmentation and least privilege principles are implemented.
🎯 Exploit Status
Requires local network access and knowledge of Windows pipe exploitation techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.0.7 and later
Vendor Advisory: https://fortiguard.com/psirt/FG-IR-22-429
Restart Required: Yes
Instructions:
1. Download FortiClient version 7.0.7 or later from Fortinet support portal. 2. Run the installer with administrative privileges. 3. Follow the installation wizard. 4. Restart the system when prompted.
🔧 Temporary Workarounds
Disable unnecessary file sharing
windowsReduce attack surface by disabling file sharing services that are not required for business operations.
net stop LanmanServer
sc config LanmanServer start= disabled
Implement network segmentation
allSegment file sharing networks to limit potential attackers' access to vulnerable systems.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate file sharing networks
- Apply principle of least privilege to all user accounts and service accounts
🔍 How to Verify
Check if Vulnerable:
Check FortiClient version in Settings > About. If version is below 7.0.7, the system is vulnerable.
Check Version:
wmic product where "name like 'FortiClient%'" get version
Verify Fix Applied:
Verify FortiClient version is 7.0.7 or higher in Settings > About after patching.
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation events from FortiClient processes
- Suspicious named pipe creation or access attempts
Network Indicators:
- Unexpected SMB or file sharing traffic to FortiClient systems
- Lateral movement attempts from file sharing segments
SIEM Query:
EventID=4688 AND (NewProcessName LIKE '%forticlient%' OR ParentProcessName LIKE '%forticlient%') AND CommandLine CONTAINS 'pipe'