CVE-2023-33302

4.7 MEDIUM

📋 TL;DR

This vulnerability allows authenticated attackers with regular webmail access to trigger a buffer overflow via crafted HTTP requests, potentially leading to arbitrary code execution. It affects Fortinet FortiMail webmail/administrative interface versions 6.4.0-6.4.4 and before 6.2.6, and FortiNDR administrative interface versions before 7.1.0 and 7.2.0.

💻 Affected Systems

Products:
  • Fortinet FortiMail
  • Fortinet FortiNDR
Versions: FortiMail: 6.4.0-6.4.4, <6.2.6; FortiNDR: 7.2.0, <7.1.0
Operating Systems: FortiOS-based appliances
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to webmail or administrative interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker gains remote code execution with administrative privileges, leading to complete system compromise and data exfiltration.

🟠

Likely Case

Authenticated attacker causes denial of service or executes limited commands within the application context.

🟢

If Mitigated

Attack fails due to proper input validation or memory protections, resulting in application crash at worst.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authentication and crafting specific HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiMail: 6.4.5, 6.2.6; FortiNDR: 7.1.0, 7.2.1

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-21-023

Restart Required: Yes

Instructions:

1. Download appropriate firmware from Fortinet support portal. 2. Backup configuration. 3. Apply firmware update via web interface or CLI. 4. Reboot device.

🔧 Temporary Workarounds

Restrict network access

all

Limit access to webmail and administrative interfaces to trusted IP addresses only.

config firewall address
edit trusted_network
set subnet 192.168.1.0/24
next
config firewall policy
edit 1
set srcaddr trusted_network
set dstaddr wan1
set service HTTP HTTPS
set action accept

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices from critical systems.
  • Enable web application firewall rules to block suspicious HTTP request patterns.

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (System > Dashboard) or CLI command 'get system status'.

Check Version:

get system status | grep Version

Verify Fix Applied:

Confirm firmware version matches patched versions: FortiMail 6.4.5/6.2.6 or higher, FortiNDR 7.1.0/7.2.1 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to webmail endpoints
  • Application crash logs with memory violation errors

Network Indicators:

  • HTTP requests with unusually long parameters or headers to /webmail/* endpoints

SIEM Query:

source="fortimail" OR source="fortindr" AND (http_method="POST" AND (uri_path="/webmail/*" OR uri_path="/admin/*") AND content_length>10000)

🔗 References

📤 Share & Export