CVE-2023-25610

9.8 CRITICAL

📋 TL;DR

This critical vulnerability allows remote unauthenticated attackers to execute arbitrary code or commands on affected Fortinet devices via crafted requests to the administrative interface. It affects multiple FortiOS, FortiProxy, and FortiOS-6K7K versions. Attackers can gain full control of vulnerable systems without authentication.

💻 Affected Systems

Products:
  • FortiOS
  • FortiProxy
  • FortiOS-6K7K
Versions: FortiOS 7.2.0-7.2.3, 7.0.0-7.0.6, 6.4.0-6.4.11, 6.2.12 and below; FortiProxy 7.2.0-7.2.2, 7.0.0-7.0.8, 2.0.12 and below; FortiOS-6K7K 7.0.5, 6.4.0-6.4.10, 6.2.0-6.2.10 and below
Operating Systems: FortiOS
Default Config Vulnerable: ⚠️ Yes
Notes: All affected versions with administrative interface enabled are vulnerable. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install persistent backdoors, exfiltrate sensitive data, pivot to internal networks, and disrupt operations.

🟠

Likely Case

Remote code execution leading to ransomware deployment, credential theft, network reconnaissance, and lateral movement.

🟢

If Mitigated

Limited impact if systems are patched, have strict network segmentation, and administrative interfaces are not internet-facing.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates trivial exploitation. While no public PoC exists, threat actors likely have developed exploits given the severity and unauthenticated nature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiOS 7.2.4+, 7.0.7+, 6.4.12+, 6.2.13+; FortiProxy 7.2.3+, 7.0.9+, 2.0.13+; FortiOS-6K7K 7.0.6+, 6.4.11+, 6.2.11+

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-23-001

Restart Required: Yes

Instructions:

1. Backup configuration. 2. Download appropriate firmware from Fortinet support portal. 3. Upload firmware via GUI or CLI. 4. Reboot device. 5. Verify successful upgrade.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative interface access to trusted IP addresses only.

config system interface
edit <interface_name>
set allowaccess https ssh
set trust-ip-1 <trusted_ip>
end

Disable Unused Administrative Services

all

Turn off HTTPS/SSH administrative access if not required.

config system interface
edit <interface_name>
set allowaccess ping
unset allowaccess https ssh
end

🧯 If You Can't Patch

  • Immediately restrict administrative interfaces from internet exposure using firewall rules.
  • Implement strict network segmentation to isolate vulnerable devices from critical assets.

🔍 How to Verify

Check if Vulnerable:

Check current version via CLI: 'get system status' and compare with affected versions list.

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify version is patched: 'get system status' should show version above affected ranges.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative interface access attempts
  • Multiple failed login attempts followed by successful access
  • Suspicious command execution in logs

Network Indicators:

  • Unexpected outbound connections from Fortinet devices
  • Anomalous traffic patterns to/from administrative ports

SIEM Query:

source="fortigate" AND (event_type="traffic" OR event_type="utm") AND (dst_port=443 OR dst_port=22) AND src_ip NOT IN [trusted_ips]

🔗 References

📤 Share & Export