CVE-2024-23107

5.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated attackers on FortiWeb web application firewalls to read password hashes of other administrators through CLI commands. This affects FortiWeb versions 7.4.0, 7.2.4 and below, 7.0.8 and below, and all 6.3 versions. Attackers must already have administrative access to exploit this vulnerability.

💻 Affected Systems

Products:
  • FortiWeb Web Application Firewall
Versions: 7.4.0, 7.2.4 and below, 7.0.8 and below, all 6.3 versions
Operating Systems: FortiOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated administrative access to exploit. All affected versions in default configuration are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious administrator could harvest password hashes of other administrators, potentially crack them offline, and gain unauthorized access to additional administrative accounts, leading to complete system compromise.

🟠

Likely Case

An attacker with existing administrative access uses CLI commands to view other administrators' password hashes, potentially enabling lateral movement within the administrative user base.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to information disclosure without enabling further system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated administrative access. The vulnerability involves simple CLI commands to read password hashes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.4.1, 7.2.5, 7.0.9, 6.3.20

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-23-191

Restart Required: Yes

Instructions:

1. Download the appropriate firmware update from Fortinet support portal. 2. Backup current configuration. 3. Apply firmware update through web interface or CLI. 4. Reboot the FortiWeb appliance. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative access to only trusted personnel and implement strict access controls.

Monitor CLI Activity

all

Enable detailed logging of CLI commands and monitor for suspicious hash viewing activities.

config log syslogd setting
set status enable
set server <IP>
end

🧯 If You Can't Patch

  • Implement strict administrative access controls and principle of least privilege.
  • Enable comprehensive logging and monitoring of all administrative CLI activities.

🔍 How to Verify

Check if Vulnerable:

Check FortiWeb version via CLI: 'get system status' and compare against affected versions.

Check Version:

get system status

Verify Fix Applied:

Verify firmware version is 7.4.1, 7.2.5, 7.0.9, or 6.3.20 or higher using 'get system status' command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI commands accessing administrator password information
  • Multiple failed login attempts following hash exposure

Network Indicators:

  • Unusual administrative access patterns
  • Traffic to password cracking services

SIEM Query:

source="fortiweb" AND (event_type="cli_command" AND command="*password*" OR command="*hash*")

🔗 References

📤 Share & Export