CVE-2023-41673

7.1 HIGH

📋 TL;DR

An improper authorization vulnerability in Fortinet FortiADC allows low-privileged users to read or backup the full system configuration via HTTP/HTTPS requests. This exposes sensitive configuration data, potentially including credentials and network details. Affected versions are FortiADC 7.4.0 and before 7.2.2.

💻 Affected Systems

Products:
  • Fortinet FortiADC
Versions: 7.4.0 and versions before 7.2.2
Operating Systems: Fortinet's proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configurations; no special settings required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full system configuration, enabling credential theft, network mapping, and further attacks like privilege escalation or lateral movement.

🟠

Likely Case

Low-privileged users or attackers with initial access exfiltrate configuration data, compromising security settings and sensitive information.

🟢

If Mitigated

With proper access controls and patching, impact is limited to unauthorized configuration viewing, but no direct system compromise.

🌐 Internet-Facing: HIGH if FortiADC is exposed to the internet, as attackers can exploit it remotely via HTTP/HTTPS.
🏢 Internal Only: MEDIUM if internal-only, as it requires initial network access but still poses significant risk from insider threats.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires low-privileged user access; no public proof-of-concept is known, but the vulnerability is straightforward to abuse.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiADC 7.2.2 or later, and 7.4.1 or later

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-23-270

Restart Required: Yes

Instructions:

1. Access the FortiADC management interface. 2. Navigate to System > Dashboard > Status. 3. Check current version. 4. If vulnerable, upgrade to FortiADC 7.2.2 or later, or 7.4.1 or later. 5. Restart the device after upgrade.

🔧 Temporary Workarounds

Restrict Access to Management Interface

all

Limit HTTP/HTTPS access to the FortiADC management interface to trusted IP addresses only.

Configure firewall rules or ACLs to allow management access from specific IPs.

Enforce Least Privilege

all

Review and minimize user privileges to reduce the number of low-privileged accounts with access.

Use FortiADC user management to restrict permissions to necessary functions only.

🧯 If You Can't Patch

  • Monitor logs for unauthorized configuration access attempts and investigate anomalies.
  • Isolate FortiADC from untrusted networks and implement network segmentation to limit exposure.

🔍 How to Verify

Check if Vulnerable:

Check the FortiADC version via the web interface or CLI; if version is 7.4.0 or before 7.2.2, it is vulnerable.

Check Version:

get system status

Verify Fix Applied:

After patching, confirm the version is 7.2.2 or later, or 7.4.1 or later, and test that low-privileged users cannot access full configuration.

📡 Detection & Monitoring

Log Indicators:

  • Log entries showing configuration backup or read actions by low-privileged users.
  • Unusual HTTP/HTTPS requests to configuration endpoints from unauthorized accounts.

Network Indicators:

  • HTTP/HTTPS traffic to FortiADC management ports (e.g., 80, 443) from unexpected sources.

SIEM Query:

source="fortiadc" AND (event_type="config_read" OR event_type="backup") AND user_privilege="low"

🔗 References

📤 Share & Export