CVE-2023-44255

4.1 MEDIUM

📋 TL;DR

This vulnerability allows authenticated administrators with read permissions in Fortinet FortiManager, FortiAnalyzer, and FortiAnalyzer-BigData to access event logs from administrative domains (adoms) they shouldn't have access to. Attackers can exploit this by sending specially crafted HTTP or HTTPS requests to read sensitive information from other adoms. Organizations using affected versions of these Fortinet products are at risk.

💻 Affected Systems

Products:
  • Fortinet FortiManager
  • Fortinet FortiAnalyzer
  • Fortinet FortiAnalyzer-BigData
Versions: FortiManager before 7.4.2, FortiAnalyzer before 7.4.2, FortiAnalyzer-BigData before 7.2.5
Operating Systems: FortiOS-based appliances
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative read permissions to exploit. Affects multi-adom configurations where data segregation between administrative domains is expected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged attackers could access sensitive event logs from multiple administrative domains, potentially exposing confidential operational data, security incidents, or user activities across the organization.

🟠

Likely Case

Administrators with read permissions could inadvertently or intentionally access event logs from adoms outside their authorized scope, violating data segregation policies and potentially exposing sensitive operational information.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to authorized administrators who already have some level of access, though they would still be accessing data beyond their intended permissions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated administrative access with read permissions. Attack involves crafting HTTP/HTTPS requests to bypass adom access controls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiManager 7.4.2, FortiAnalyzer 7.4.2, FortiAnalyzer-BigData 7.2.5

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-23-267

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download appropriate firmware version from Fortinet support portal. 3. Upload firmware to device via GUI or CLI. 4. Install update. 5. Reboot device. 6. Verify successful upgrade and configuration.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative accounts with read permissions to only essential personnel and implement strict access controls.

Network Segmentation

all

Isolate management interfaces from general network access and implement strict firewall rules.

🧯 If You Can't Patch

  • Implement strict principle of least privilege for administrative accounts, ensuring users only have access to necessary adoms.
  • Enable detailed logging and monitoring of administrative access to event logs and review regularly for unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Check device version via GUI (System > Dashboard) or CLI (get system status). Compare against affected versions.

Check Version:

get system status | grep Version

Verify Fix Applied:

After patching, verify version is at or above patched versions. Test administrative access to confirm adom segregation is enforced.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to event logs from administrative accounts
  • Access attempts to adom event logs outside user's assigned adoms
  • Multiple failed followed by successful event log access attempts

Network Indicators:

  • HTTP/HTTPS requests to event log endpoints with crafted parameters
  • Unusual volume of requests to /api/v2/monitor/event/ endpoints

SIEM Query:

source="fortimanager" OR source="fortianalyzer" AND (event_type="admin_login" OR event_type="event_log_access") AND adom!="authorized_adom"

🔗 References

📤 Share & Export