CVE-2024-21762
📋 TL;DR
This critical vulnerability allows remote attackers to execute arbitrary code or commands on affected Fortinet devices via specially crafted requests. An out-of-bounds write in FortiOS and FortiProxy enables unauthorized code execution. Organizations using vulnerable versions of Fortinet's firewall and proxy products are affected.
💻 Affected Systems
- Fortinet FortiOS
- Fortinet FortiProxy
📦 What is this software?
Fortios by Fortinet
Fortios by Fortinet
Fortios by Fortinet
Fortios by Fortinet
Fortios by Fortinet
Fortios by Fortinet
Fortiproxy by Fortinet
Fortiproxy by Fortinet
Fortiproxy by Fortinet
Fortiproxy by Fortinet
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to gain full control of the device, pivot to internal networks, steal sensitive data, and deploy ransomware or other malware.
Likely Case
Remote code execution leading to network infiltration, data exfiltration, and establishment of persistent backdoors for further attacks.
If Mitigated
Limited impact if devices are behind additional security layers, but still significant risk due to the critical nature of the vulnerability.
🎯 Exploit Status
CISA has added this to its Known Exploited Vulnerabilities catalog, confirming active exploitation in the wild. The vulnerability requires no authentication and has low attack complexity.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: FortiOS: 7.4.3, 7.2.7, 7.0.14, 6.4.15, 6.2.16, 6.0.18; FortiProxy: 7.4.3, 7.2.9, 7.0.15, 2.0.14, 1.2.14, 1.1.7, 1.0.8
Vendor Advisory: https://fortiguard.com/psirt/FG-IR-24-015
Restart Required: Yes
Instructions:
1. Download the appropriate firmware version from Fortinet support portal. 2. Backup current configuration. 3. Upload firmware via web GUI or CLI. 4. Install firmware update. 5. Reboot device. 6. Verify successful update and restore functionality.
🔧 Temporary Workarounds
Network Segmentation
allIsolate vulnerable devices from critical networks and internet exposure
Access Control Lists
allImplement strict network ACLs to limit access to management interfaces
🧯 If You Can't Patch
- Immediately isolate vulnerable devices from internet exposure
- Implement strict network segmentation and monitor for exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check FortiOS/FortiProxy version via web GUI (System > Dashboard) or CLI command 'get system status'
Check Version:
get system status | grep Version
Verify Fix Applied:
Verify version is updated to patched version via 'get system status' or web GUI dashboard
📡 Detection & Monitoring
Log Indicators:
- Unusual process execution
- Unexpected configuration changes
- Failed authentication attempts followed by successful access
- Suspicious network traffic patterns
Network Indicators:
- Anomalous outbound connections from Fortinet devices
- Unexpected traffic to/from management interfaces
- Port scanning originating from Fortinet devices
SIEM Query:
source="fortigate" AND (event_type="traffic" OR event_type="system") AND (msg="*exec*" OR msg="*command*" OR msg="*unauthorized*" OR msg="*out-of-bounds*")