CVE-2023-36554

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code or commands on Fortinet FortiManager devices through specially crafted HTTP requests due to improper access control. Affected organizations include those running vulnerable FortiManager versions without proper patching or network segmentation.

💻 Affected Systems

Products:
  • Fortinet FortiManager
Versions: 7.4.0, 7.2.0-7.2.3, 7.0.0-7.0.10, 6.4.0-6.4.13, all 6.2.x versions
Operating Systems: FortiOS-based appliances
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of FortiManager device leading to network-wide device management takeover, lateral movement to managed devices, and data exfiltration.

🟠

Likely Case

Unauthorized administrative access to FortiManager, configuration changes to managed devices, and potential credential harvesting.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication, and intrusion detection systems.

🌐 Internet-Facing: HIGH - HTTP-based attack vector makes internet-exposed devices particularly vulnerable to remote exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

HTTP-based attack vector with no authentication required suggests relatively easy exploitation. Fortinet has not disclosed specific exploit details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.4.1, 7.2.4, 7.0.11, 6.4.14

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-23-103

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download appropriate firmware from Fortinet support portal. 3. Upload firmware to FortiManager. 4. Install update via System > Settings > Firmware. 5. Reboot device after installation.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to FortiManager management interface to trusted networks only

Access Control Lists

all

Implement strict firewall rules limiting HTTP/HTTPS access to FortiManager

config firewall policy
edit 0
set srcintf "trusted_interface"
set dstintf "fortimanager_interface"
set srcaddr "trusted_networks"
set dstaddr "fortimanager_ip"
set action accept
set service "HTTP HTTPS"
next

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FortiManager from untrusted networks
  • Enable multi-factor authentication and strict access controls for administrative interfaces

🔍 How to Verify

Check if Vulnerable:

Check FortiManager version via GUI (System > Dashboard) or CLI (get system status). Compare against affected versions list.

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify version is updated to patched version (7.4.1, 7.2.4, 7.0.11, or 6.4.14) and test HTTP request handling.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to FortiManager management interface
  • Multiple failed authentication attempts followed by successful administrative actions
  • Unexpected configuration changes or new administrative users

Network Indicators:

  • HTTP requests with unusual payloads or headers to FortiManager management ports
  • Traffic from unexpected source IPs to FortiManager management interface

SIEM Query:

source="fortimanager" AND (http_method="POST" OR http_method="PUT") AND (url_contains("/api/") OR url_contains("/mgmt/")) AND status_code=200 AND user_agent="unusual"

🔗 References

📤 Share & Export