CVE-2024-23113

9.8 CRITICAL

📋 TL;DR

This critical vulnerability allows remote attackers to execute arbitrary code or commands on affected Fortinet devices by sending specially crafted packets that exploit a format string vulnerability. It affects multiple Fortinet products including FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager. Organizations using these products in vulnerable versions are at immediate risk.

💻 Affected Systems

Products:
  • FortiOS
  • FortiProxy
  • FortiPAM
  • FortiSwitchManager
Versions: FortiOS 7.4.0-7.4.2, 7.2.0-7.2.6, 7.0.0-7.0.13; FortiProxy 7.4.0-7.4.2, 7.2.0-7.2.8, 7.0.0-7.0.14; FortiPAM 1.2.0, 1.1.0-1.1.2, 1.0.0-1.0.3; FortiSwitchManager 7.2.0-7.2.3, 7.0.0-7.0.3
Operating Systems: FortiOS-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations running affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to gain full control of the device, install persistent backdoors, pivot to internal networks, and exfiltrate sensitive data.

🟠

Likely Case

Remote code execution leading to device takeover, credential theft, network reconnaissance, and lateral movement within the environment.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict network segmentation and packet filtering, though risk remains significant.

🌐 Internet-Facing: HIGH - Exploitable via network packets, making internet-facing devices extremely vulnerable to remote attacks.
🏢 Internal Only: HIGH - Even internally, attackers who gain network access can exploit this vulnerability to compromise devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to their Known Exploited Vulnerabilities catalog, indicating active exploitation is occurring or expected. The format string vulnerability requires minimal sophistication to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiOS 7.4.3, 7.2.7, 7.0.14; FortiProxy 7.4.3, 7.2.9, 7.0.15; FortiPAM 1.2.1, 1.1.3, 1.0.4; FortiSwitchManager 7.2.4, 7.0.4

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-24-029

Restart Required: Yes

Instructions:

1. Download the appropriate firmware update from Fortinet support portal. 2. Backup current configuration. 3. Apply firmware update via CLI or web interface. 4. Reboot device. 5. Verify version after reboot.

🔧 Temporary Workarounds

Network Segmentation and Access Control

all

Restrict network access to affected devices using firewall rules to only allow trusted sources.

# Example: FortiOS CLI to restrict management access
config system interface
edit <interface_name>
set allowaccess https ssh
end

🧯 If You Can't Patch

  • Isolate affected devices in a dedicated VLAN with strict firewall rules limiting inbound/outbound traffic
  • Implement network-based intrusion prevention systems (IPS) with rules to detect and block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check device version via CLI: 'get system status' or web interface: System > Dashboard. Compare against affected version ranges.

Check Version:

get system status | grep Version

Verify Fix Applied:

After patching, verify version is above vulnerable ranges: FortiOS >=7.4.3, >=7.2.7, >=7.0.14; FortiProxy >=7.4.3, >=7.2.9, >=7.0.15; FortiPAM >=1.2.1, >=1.1.3, >=1.0.4; FortiSwitchManager >=7.2.4, >=7.0.4

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation, unexpected command execution, abnormal network connections from device, format string error messages in system logs

Network Indicators:

  • Malformed packets targeting Fortinet devices, unusual traffic patterns to/from management interfaces, exploit kit signatures

SIEM Query:

source="fortinet" AND (event_type="process_creation" OR event_type="command_execution") AND user!="admin"

🔗 References

📤 Share & Export