CVE-2024-23664

6.1 MEDIUM

📋 TL;DR

This CVE describes an open redirect vulnerability in Fortinet FortiAuthenticator that allows attackers to craft malicious URLs that redirect users to arbitrary, potentially malicious websites. The vulnerability affects FortiAuthenticator versions 6.6.0, 6.5.3 and below, and 6.4.9 and below. This could be used in phishing campaigns or to redirect users to malware distribution sites.

💻 Affected Systems

Products:
  • Fortinet FortiAuthenticator
Versions: 6.6.0, 6.5.3 and below, 6.4.9 and below
Operating Systems: FortiOS
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations of affected versions are vulnerable if the FortiAuthenticator is accessible via network.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could redirect authenticated users to malicious sites that steal credentials, install malware, or conduct sophisticated phishing attacks, potentially leading to full system compromise.

🟠

Likely Case

Attackers use crafted URLs in phishing emails or messages to redirect users to fake login pages or malware distribution sites, leading to credential theft or malware infections.

🟢

If Mitigated

With proper URL validation and user awareness training, impact is limited to failed phishing attempts with minimal damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Open redirect vulnerabilities are commonly exploited in phishing campaigns and require minimal technical skill to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.6.1, 6.5.4, 6.4.10

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-23-465

Restart Required: Yes

Instructions:

1. Log into FortiAuthenticator admin interface. 2. Navigate to System > Dashboard. 3. Check for available firmware updates. 4. Download and install the appropriate patched version (6.6.1, 6.5.4, or 6.4.10). 5. Reboot the appliance after installation completes.

🔧 Temporary Workarounds

Implement WAF rules

all

Configure web application firewall rules to block or sanitize redirect URLs containing external domains.

Depends on specific WAF platform - configure rules to validate redirect URLs

Restrict network access

all

Limit network access to FortiAuthenticator to trusted IP ranges only.

Configure firewall rules to restrict access to FortiAuthenticator management interface

🧯 If You Can't Patch

  • Implement strict URL validation at network perimeter to block malicious redirect patterns
  • Deploy email security solutions that scan for and block phishing URLs containing FortiAuthenticator domains

🔍 How to Verify

Check if Vulnerable:

Check FortiAuthenticator version via admin interface: System > Dashboard > System Information

Check Version:

Not applicable - check via web interface

Verify Fix Applied:

Verify version is updated to 6.6.1, 6.5.4, or 6.4.10 in System > Dashboard > System Information

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in web server logs
  • Multiple failed redirect attempts
  • Requests containing crafted redirect parameters

Network Indicators:

  • HTTP 302 redirects to unexpected external domains
  • Traffic patterns showing users being redirected to suspicious sites

SIEM Query:

source="fortiauthenticator" AND (url="*redirect=*" OR url="*url=*") AND dest_domain NOT IN (allowed_domains)

🔗 References

📤 Share & Export