CVE-2024-23106

8.1 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to perform brute force attacks against the FortiClientEMS console by sending excessive authentication attempts via HTTP/HTTPS requests. It affects FortiClientEMS versions 7.2.0 through 7.2.4 and versions before 7.0.10. Attackers could potentially gain administrative access to the EMS console.

💻 Affected Systems

Products:
  • FortiClientEMS
Versions: 7.2.0 through 7.2.4, and versions before 7.0.10
Operating Systems: All supported FortiClientEMS platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to FortiClientEMS console, allowing them to deploy malicious configurations, steal credentials, or compromise managed endpoints.

🟠

Likely Case

Attackers successfully brute force weak administrator passwords, gaining unauthorized access to the EMS management interface.

🟢

If Mitigated

Attack attempts are detected and blocked by rate limiting or account lockout mechanisms before successful compromise.

🌐 Internet-Facing: HIGH - The vulnerability affects web-based authentication and can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - While still exploitable internally, internal network segmentation and monitoring can reduce risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP/HTTPS access to the EMS console and ability to send authentication requests. No special tools or knowledge needed beyond basic HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2.5 or 7.0.10 and later

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-23-476

Restart Required: Yes

Instructions:

1. Download FortiClientEMS version 7.2.5 or 7.0.10 from Fortinet support portal. 2. Backup current configuration. 3. Install the update following Fortinet's upgrade guide. 4. Restart the EMS service or server.

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to FortiClientEMS console to trusted IP addresses only

Strong Password Enforcement

all

Enforce complex, long passwords for all EMS administrator accounts to resist brute force attempts

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to FortiClientEMS console
  • Enable detailed logging and monitoring for failed authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check FortiClientEMS version via web interface or CLI. If version is between 7.2.0-7.2.4 or below 7.0.10, system is vulnerable.

Check Version:

From EMS CLI: get system status | grep Version

Verify Fix Applied:

Verify version is 7.2.5 or higher, or 7.0.10 or higher. Test authentication with multiple failed attempts to confirm rate limiting is working.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts from single IP address
  • Unusual authentication patterns outside business hours

Network Indicators:

  • High volume of HTTP POST requests to /login endpoint
  • Multiple authentication failures followed by success

SIEM Query:

source="forticlientems" AND (event_type="authentication_failure" AND count > 10 within 5 minutes)

🔗 References

📤 Share & Export