CVE-2023-45588

8.2 HIGH

📋 TL;DR

This vulnerability allows a local attacker to execute arbitrary code or commands on macOS systems running vulnerable FortiClient versions. Attackers can exploit this by placing a malicious configuration file in the /tmp directory before installation begins. Affected users include anyone running FortiClientMac version 7.2.3 or below, or version 7.0.10 or below.

💻 Affected Systems

Products:
  • FortiClientMac
Versions: 7.2.3 and below, 7.0.10 and below
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the installer process; requires attacker to have local access and ability to write to /tmp directory before installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root privileges, installing persistent backdoors, stealing credentials, and accessing sensitive data.

🟠

Likely Case

Local privilege escalation allowing attackers to execute arbitrary commands with elevated privileges, potentially leading to lateral movement within the network.

🟢

If Mitigated

Limited impact with proper file permissions and monitoring preventing unauthorized file creation in /tmp directory.

🌐 Internet-Facing: LOW - This is a local attack requiring physical or remote access to the system, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Malicious insiders or compromised accounts with local access can exploit this to gain elevated privileges and move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and timing to place malicious file before installation starts; not trivial but feasible for determined attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to FortiClientMac version 7.2.4 or 7.0.11

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-23-345

Restart Required: No

Instructions:

1. Download latest FortiClientMac installer from Fortinet support portal. 2. Uninstall current vulnerable version. 3. Install updated version. 4. Verify installation completed successfully.

🔧 Temporary Workarounds

Secure /tmp directory permissions

macOS

Restrict write permissions to /tmp directory to prevent unauthorized file creation

sudo chmod 1777 /tmp
sudo chown root:wheel /tmp

🧯 If You Can't Patch

  • Monitor /tmp directory for suspicious file creation during FortiClient installation processes
  • Implement strict access controls to limit who can install software on macOS systems

🔍 How to Verify

Check if Vulnerable:

Check FortiClientMac version in About dialog or run: /Applications/FortiClient.app/Contents/MacOS/FortiClient --version

Check Version:

/Applications/FortiClient.app/Contents/MacOS/FortiClient --version

Verify Fix Applied:

Confirm version is 7.2.4 or higher, or 7.0.11 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file creation in /tmp directory with FortiClient-related names
  • Unexpected FortiClient installation processes running

Network Indicators:

  • Unusual outbound connections from FortiClient processes post-installation

SIEM Query:

source="macos" AND (event="file_create" AND path="/tmp/*forticlient*" OR process="FortiClient" AND action="install")

🔗 References

📤 Share & Export