CVE-2023-41677

7.5 HIGH

📋 TL;DR

This vulnerability involves insufficiently protected credentials in Fortinet FortiProxy and FortiOS, allowing attackers to execute unauthorized code or commands via social engineering attacks. Affected users include those running vulnerable versions of FortiProxy (1.0.0-1.0.7, 1.1.0-1.1.6, 1.2.0-1.2.13, 2.0.0-2.0.13, 7.0.0-7.0.12, 7.2.0-7.2.6, 7.4.0) and FortiOS (6.0.0-6.0.17, 6.2.0-6.2.15, 6.4.0-6.4.14, 7.0.0-7.0.12, 7.2.0-7.2.6, 7.4.0-7.4.1).

💻 Affected Systems

Products:
  • Fortinet FortiProxy
  • Fortinet FortiOS
Versions: FortiProxy: 1.0.0-1.0.7, 1.1.0-1.1.6, 1.2.0-1.2.13, 2.0.0-2.0.13, 7.0.0-7.0.12, 7.2.0-7.2.6, 7.4.0; FortiOS: 6.0.0-6.0.17, 6.2.0-6.2.15, 6.4.0-6.4.14, 7.0.0-7.0.12, 7.2.0-7.2.6, 7.4.0-7.4.1
Operating Systems: FortiOS (proprietary)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires social engineering to exploit; default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Unauthorized command execution leading to configuration changes, credential theft, or limited data access.

🟢

If Mitigated

Attack fails due to proper credential protection, multi-factor authentication, or network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to obtain credentials; no public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiProxy: 7.4.1, 7.2.7, 7.0.13, 2.0.14, 1.2.14, 1.1.7, 1.0.8; FortiOS: 7.4.2, 7.2.7, 7.0.13, 6.4.15, 6.2.16, 6.0.18

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-23-493

Restart Required: Yes

Instructions:

1. Backup configuration. 2. Download and install the patched version from Fortinet support portal. 3. Restart the device. 4. Verify the update.

🔧 Temporary Workarounds

Enforce Strong Credential Policies

all

Implement complex passwords, regular rotation, and disable default accounts.

Enable Multi-Factor Authentication

all

Require MFA for administrative access to reduce impact of credential exposure.

🧯 If You Can't Patch

  • Restrict administrative access to trusted IPs only.
  • Monitor for unusual login attempts and command execution.

🔍 How to Verify

Check if Vulnerable:

Check the device version via CLI: 'get system status' and compare with affected versions.

Check Version:

get system status

Verify Fix Applied:

After patching, run 'get system status' to confirm version is patched.

📡 Detection & Monitoring

Log Indicators:

  • Failed login attempts
  • Unusual command execution
  • Configuration changes from unexpected sources

Network Indicators:

  • Unauthorized administrative access from external IPs
  • Suspicious outbound connections

SIEM Query:

source="fortigate" AND (eventtype="login_failed" OR eventtype="config_change")

🔗 References

📤 Share & Export