CVE-2024-23112

8.0 HIGH

📋 TL;DR

This CVE describes an authorization bypass vulnerability in FortiOS and FortiProxy SSL-VPN that allows authenticated attackers to access other users' bookmarks through URL manipulation. Attackers can exploit user-controlled keys to bypass authorization checks and view unauthorized resources. This affects all organizations running vulnerable versions of FortiOS 6.4.7-6.4.14, 7.0.1-7.0.13, 7.2.0-7.2.6, 7.4.0-7.4.1 and FortiProxy 7.0.0-7.0.14, 7.2.0-7.2.8, 7.4.0-7.4.2.

💻 Affected Systems

Products:
  • FortiOS
  • FortiProxy
Versions: FortiOS 6.4.7-6.4.14, 7.0.1-7.0.13, 7.2.0-7.2.6, 7.4.0-7.4.1; FortiProxy 7.0.0-7.0.14, 7.2.0-7.2.8, 7.4.0-7.4.2
Operating Systems: FortiOS (Fortinet proprietary OS)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects SSL-VPN functionality. Requires authenticated access to SSL-VPN portal.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could access sensitive user bookmarks containing internal resources, credentials, or privileged access URLs, potentially leading to lateral movement and data exfiltration.

🟠

Likely Case

Attackers with valid SSL-VPN credentials can view other users' bookmarks to discover internal resources, map network topology, and potentially access restricted systems.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to unauthorized viewing of bookmark data without direct system access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated SSL-VPN access and involves URL manipulation. No public exploit code available at disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiOS 7.4.2, 7.2.7, 7.0.14, 6.4.15; FortiProxy 7.4.3, 7.2.9, 7.0.15

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-24-013

Restart Required: Yes

Instructions:

1. Download appropriate firmware version from Fortinet support portal. 2. Backup current configuration. 3. Upload firmware via web GUI or CLI. 4. Reboot device after successful upload. 5. Verify version after reboot.

🔧 Temporary Workarounds

Disable SSL-VPN bookmarks

all

Remove or disable bookmark functionality in SSL-VPN configuration to eliminate attack surface.

config vpn ssl web portal
edit <portal_name>
unset allow-user-bookmark
next
end

Restrict SSL-VPN access

all

Limit SSL-VPN access to only necessary users and implement strict authentication controls.

config user local
edit <user>
set type password
set two-factor disable
set passwd <password>
next
end

🧯 If You Can't Patch

  • Implement network segmentation to isolate resources accessible via SSL-VPN bookmarks
  • Enable detailed logging and monitoring of SSL-VPN access patterns for anomalous behavior

🔍 How to Verify

Check if Vulnerable:

Check FortiOS/FortiProxy version via CLI: 'get system status' or web GUI: Dashboard > System Information

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify version is patched: FortiOS >=7.4.2, 7.2.7, 7.0.14, 6.4.15 or FortiProxy >=7.4.3, 7.2.9, 7.0.15

📡 Detection & Monitoring

Log Indicators:

  • Multiple bookmark access attempts from single user
  • Unusual URL patterns in SSL-VPN logs
  • Access to bookmark resources outside normal user patterns

Network Indicators:

  • Abnormal SSL-VPN session patterns
  • Multiple resource access attempts in short timeframes

SIEM Query:

source="fortigate" AND "sslvpn" AND ("bookmark" OR "portal") | stats count by src_ip, user

🔗 References

📤 Share & Export