CVE-2023-46717

7.5 HIGH

📋 TL;DR

This vulnerability allows a read-only user to escalate privileges to read-write access through successive login attempts in FortiOS when configured with FortiAuthenticator in HA mode. It affects FortiOS versions 7.4.1 and below, 7.2.6 and below, and 7.0.12 and below. Organizations using these configurations are at risk of unauthorized administrative access.

💻 Affected Systems

Products:
  • FortiOS
Versions: 7.4.1 and below, 7.2.6 and below, 7.0.12 and below
Operating Systems: FortiOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when configured with FortiAuthenticator in High Availability (HA) mode.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control over the FortiOS device, enabling them to modify configurations, create backdoors, intercept traffic, or disable security controls entirely.

🟠

Likely Case

A malicious insider or compromised low-privilege account escalates to administrative privileges, potentially modifying firewall rules, VPN settings, or network policies.

🟢

If Mitigated

With proper network segmentation and monitoring, the impact is limited to the affected FortiOS device, with quick detection of unauthorized configuration changes.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires existing read-only user credentials and specific HA configuration with FortiAuthenticator.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiOS 7.4.2, 7.2.7, 7.0.13

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-23-424

Restart Required: Yes

Instructions:

1. Download the appropriate patched version from Fortinet support portal. 2. Backup current configuration. 3. Upload and install the firmware update. 4. Reboot the device. 5. Verify the new version is running.

🔧 Temporary Workarounds

Disable FortiAuthenticator HA

all

Temporarily remove FortiAuthenticator from High Availability configuration if possible.

Restrict Read-Only User Access

all

Minimize or temporarily disable read-only user accounts until patching can be completed.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FortiOS management interfaces
  • Enable detailed logging and monitoring for authentication events and configuration changes

🔍 How to Verify

Check if Vulnerable:

Check FortiOS version via web GUI or CLI 'get system status' and verify FortiAuthenticator HA configuration.

Check Version:

get system status | grep Version

Verify Fix Applied:

After patching, verify version is 7.4.2, 7.2.7, or 7.0.13 or higher using 'get system status' command.

📡 Detection & Monitoring

Log Indicators:

  • Multiple rapid authentication attempts from same read-only user
  • Unexpected privilege escalation events
  • Configuration changes from previously read-only accounts

Network Indicators:

  • Unusual administrative traffic patterns
  • Configuration changes during non-maintenance hours

SIEM Query:

source="fortios" AND (event_type="authentication" AND result="success" AND user_role="read-only") | stats count by user, src_ip

🔗 References

📤 Share & Export