CVE-2024-23667
📋 TL;DR
CVE-2024-23667 is an improper authorization vulnerability in Fortinet FortiWebManager that allows attackers to execute unauthorized code or commands via HTTP requests or CLI. This affects FortiWebManager versions 7.2.0, 7.0.0-7.0.4, 6.3.0, 6.2.3-6.2.4, and 6.0.2. Attackers could potentially gain control of affected systems.
💻 Affected Systems
- Fortinet FortiWebManager
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining administrative control, deploying ransomware, stealing sensitive data, and pivoting to other network resources.
Likely Case
Unauthorized command execution leading to data exfiltration, installation of backdoors, or disruption of web application firewall management.
If Mitigated
Limited impact due to network segmentation, strong authentication controls, and monitoring that detects exploitation attempts.
🎯 Exploit Status
Exploitation requires network access to the management interface but does not require authentication. Attack complexity is low once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions 7.2.1, 7.0.5, 6.3.1, 6.2.5, and 6.0.3
Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-23-222
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Download appropriate patched version from Fortinet support portal. 3. Upload and install firmware update via web interface or CLI. 4. Reboot system. 5. Verify version update and functionality.
🔧 Temporary Workarounds
Restrict Management Interface Access
allLimit access to FortiWebManager management interface to trusted IP addresses only
config system interface
edit <interface_name>
set allowaccess https ssh
set trust-ip-1 <trusted_ip>
end
Enable Multi-Factor Authentication
allImplement MFA for all administrative accounts to add additional authentication layer
config system admin
edit <admin_user>
set two-factor enable
set two-factor fortitoken
end
🧯 If You Can't Patch
- Isolate FortiWebManager management interface from untrusted networks using firewall rules
- Implement strict network segmentation and monitor for unusual management interface activity
🔍 How to Verify
Check if Vulnerable:
Check FortiWebManager version via web interface (System > Dashboard) or CLI command: get system status
Check Version:
get system status | grep Version
Verify Fix Applied:
Verify version is updated to 7.2.1, 7.0.5, 6.3.1, 6.2.5, or 6.0.3 using same methods
📡 Detection & Monitoring
Log Indicators:
- Unusual CLI command execution patterns
- Multiple failed authentication attempts followed by successful access
- Unexpected process creation or system modifications
Network Indicators:
- Unusual HTTP requests to management interface from unexpected sources
- CLI sessions from non-standard IP addresses
- Traffic patterns indicating command and control communication
SIEM Query:
source="fortiwebmanager" AND (event_type="admin_login" OR event_type="cli_command") AND src_ip NOT IN [trusted_ips]