CVE-2023-44255
📋 TL;DR
This vulnerability allows authenticated administrators with read permissions in Fortinet FortiManager, FortiAnalyzer, and FortiAnalyzer-BigData to access event logs from administrative domains (adoms) they shouldn't have access to. Attackers can exploit this by sending specially crafted HTTP or HTTPS requests to read sensitive information from other adoms. Organizations using affected versions of these Fortinet products are at risk.
💻 Affected Systems
- Fortinet FortiManager
- Fortinet FortiAnalyzer
- Fortinet FortiAnalyzer-BigData
📦 What is this software?
Fortianalyzer by Fortinet
Fortimanager by Fortinet
⚠️ Risk & Real-World Impact
Worst Case
Privileged attackers could access sensitive event logs from multiple administrative domains, potentially exposing confidential operational data, security incidents, or user activities across the organization.
Likely Case
Administrators with read permissions could inadvertently or intentionally access event logs from adoms outside their authorized scope, violating data segregation policies and potentially exposing sensitive operational information.
If Mitigated
With proper access controls and monitoring, the impact is limited to authorized administrators who already have some level of access, though they would still be accessing data beyond their intended permissions.
🎯 Exploit Status
Exploitation requires authenticated administrative access with read permissions. Attack involves crafting HTTP/HTTPS requests to bypass adom access controls.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: FortiManager 7.4.2, FortiAnalyzer 7.4.2, FortiAnalyzer-BigData 7.2.5
Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-23-267
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Download appropriate firmware version from Fortinet support portal. 3. Upload firmware to device via GUI or CLI. 4. Install update. 5. Reboot device. 6. Verify successful upgrade and configuration.
🔧 Temporary Workarounds
Restrict Administrative Access
allLimit administrative accounts with read permissions to only essential personnel and implement strict access controls.
Network Segmentation
allIsolate management interfaces from general network access and implement strict firewall rules.
🧯 If You Can't Patch
- Implement strict principle of least privilege for administrative accounts, ensuring users only have access to necessary adoms.
- Enable detailed logging and monitoring of administrative access to event logs and review regularly for unauthorized access attempts.
🔍 How to Verify
Check if Vulnerable:
Check device version via GUI (System > Dashboard) or CLI (get system status). Compare against affected versions.
Check Version:
get system status | grep Version
Verify Fix Applied:
After patching, verify version is at or above patched versions. Test administrative access to confirm adom segregation is enforced.
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to event logs from administrative accounts
- Access attempts to adom event logs outside user's assigned adoms
- Multiple failed followed by successful event log access attempts
Network Indicators:
- HTTP/HTTPS requests to event log endpoints with crafted parameters
- Unusual volume of requests to /api/v2/monitor/event/ endpoints
SIEM Query:
source="fortimanager" OR source="fortianalyzer" AND (event_type="admin_login" OR event_type="event_log_access") AND adom!="authorized_adom"