CVE-2023-48790

7.5 HIGH

📋 TL;DR

This CSRF vulnerability in Fortinet FortiNDR allows remote unauthenticated attackers to execute unauthorized actions via crafted HTTP GET requests. It affects FortiNDR versions 7.4.0, 7.2.0-7.2.1, 7.1.0-7.1.1, and before 7.0.5. Attackers can trick authenticated users into performing unintended actions on the FortiNDR interface.

💻 Affected Systems

Products:
  • Fortinet FortiNDR
Versions: 7.4.0, 7.2.0 through 7.2.1, 7.1.0 through 7.1.1, and before 7.0.5
Operating Systems: FortiNDR OS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of FortiNDR system allowing attacker to modify configurations, disable security controls, or exfiltrate sensitive network detection data.

🟠

Likely Case

Unauthorized configuration changes, policy modifications, or disabling of security monitoring capabilities.

🟢

If Mitigated

Limited impact with proper CSRF protections and network segmentation in place.

🌐 Internet-Facing: HIGH - Attackers can exploit via malicious websites or emails targeting authenticated users.
🏢 Internal Only: MEDIUM - Requires internal user interaction but still exploitable via phishing or compromised internal sites.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires social engineering to trick authenticated users into visiting malicious sites. No authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.4.1, 7.2.2, 7.1.2, 7.0.5 and later

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-23-353

Restart Required: No

Instructions:

1. Log into FortiNDR admin interface. 2. Navigate to System > Dashboard. 3. Check for available updates. 4. Apply the appropriate patch version for your deployment. 5. Verify the update completes successfully.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add anti-CSRF tokens to all state-changing requests if custom web interfaces exist.

SameSite Cookie Attributes

all

Configure session cookies with SameSite=Strict or SameSite=Lax attributes.

🧯 If You Can't Patch

  • Implement network segmentation to isolate FortiNDR management interface from user networks.
  • Use web application firewalls (WAF) with CSRF protection rules and monitor for suspicious GET requests.

🔍 How to Verify

Check if Vulnerable:

Check FortiNDR version via admin interface: System > Dashboard > System Information. Compare against affected versions.

Check Version:

show system status (via CLI) or check System Information in web interface

Verify Fix Applied:

Verify version is 7.4.1, 7.2.2, 7.1.2, 7.0.5 or later. Test CSRF protection by attempting to submit forms without proper tokens.

📡 Detection & Monitoring

Log Indicators:

  • Unusual configuration changes from unexpected IP addresses
  • Multiple failed CSRF token validations
  • Suspicious GET requests to administrative endpoints

Network Indicators:

  • HTTP GET requests to FortiNDR admin endpoints with unexpected referer headers
  • Requests lacking CSRF tokens to state-changing endpoints

SIEM Query:

source="fortindr" AND (http_method="GET" AND uri CONTAINS "/api/" OR uri CONTAINS "/admin/") AND NOT user_agent CONTAINS "browser"

🔗 References

📤 Share & Export