CVE-2023-33299

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Fortinet FortiNAC systems by sending specially crafted requests to the inter-server communication port. Attackers can achieve remote code execution without authentication. All FortiNAC versions below 7.2.1, below 9.4.3, below 9.2.8, and all 8.x versions are affected.

💻 Affected Systems

Products:
  • Fortinet FortiNAC
Versions: All versions below 7.2.1, below 9.4.3, below 9.2.8, and all 8.x versions
Operating Systems: FortiNAC appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: FortiNAC versions 8.x will not receive patches according to vendor. Inter-server communication port must be accessible to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to gain full control of FortiNAC, pivot to other network systems, deploy ransomware, or establish persistent backdoors.

🟠

Likely Case

Attackers exploit the vulnerability to execute arbitrary commands, potentially gaining administrative access to FortiNAC and using it as a foothold for lateral movement within the network.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the FortiNAC system itself, though it remains compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the inter-server communication port but no authentication. CVSS 9.8 indicates critical severity with low attack complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2.1, 9.4.3, 9.2.8 or later

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-23-074

Restart Required: Yes

Instructions:

1. Backup FortiNAC configuration. 2. Download appropriate patch from Fortinet support portal. 3. Apply patch following Fortinet upgrade procedures. 4. Restart FortiNAC services. 5. Verify successful update.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict access to FortiNAC inter-server communication port using firewall rules to only trusted management systems.

Network Segmentation

all

Isolate FortiNAC systems in a dedicated management VLAN with strict access controls.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FortiNAC from critical systems
  • Deploy intrusion detection/prevention systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check FortiNAC version via web interface (System > Status) or CLI 'get system status'

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify version is 7.2.1+, 9.4.3+, or 9.2.8+ and not 8.x

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation events
  • Suspicious network connections from FortiNAC
  • Authentication failures followed by successful access

Network Indicators:

  • Unexpected traffic from FortiNAC to internal systems
  • Connection attempts to FortiNAC inter-server port from unauthorized sources

SIEM Query:

source="fortinac" AND (event_type="process_creation" OR dest_port=inter_server_port) | stats count by src_ip

🔗 References

📤 Share & Export