CVE-2024-23667

7.8 HIGH

📋 TL;DR

CVE-2024-23667 is an improper authorization vulnerability in Fortinet FortiWebManager that allows attackers to execute unauthorized code or commands via HTTP requests or CLI. This affects FortiWebManager versions 7.2.0, 7.0.0-7.0.4, 6.3.0, 6.2.3-6.2.4, and 6.0.2. Attackers could potentially gain control of affected systems.

💻 Affected Systems

Products:
  • Fortinet FortiWebManager
Versions: 7.2.0, 7.0.0-7.0.4, 6.3.0, 6.2.3-6.2.4, 6.0.2
Operating Systems: Fortinet's custom OS
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining administrative control, deploying ransomware, stealing sensitive data, and pivoting to other network resources.

🟠

Likely Case

Unauthorized command execution leading to data exfiltration, installation of backdoors, or disruption of web application firewall management.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and monitoring that detects exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to the management interface but does not require authentication. Attack complexity is low once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions 7.2.1, 7.0.5, 6.3.1, 6.2.5, and 6.0.3

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-23-222

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download appropriate patched version from Fortinet support portal. 3. Upload and install firmware update via web interface or CLI. 4. Reboot system. 5. Verify version update and functionality.

🔧 Temporary Workarounds

Restrict Management Interface Access

all

Limit access to FortiWebManager management interface to trusted IP addresses only

config system interface
edit <interface_name>
set allowaccess https ssh
set trust-ip-1 <trusted_ip>
end

Enable Multi-Factor Authentication

all

Implement MFA for all administrative accounts to add additional authentication layer

config system admin
edit <admin_user>
set two-factor enable
set two-factor fortitoken
end

🧯 If You Can't Patch

  • Isolate FortiWebManager management interface from untrusted networks using firewall rules
  • Implement strict network segmentation and monitor for unusual management interface activity

🔍 How to Verify

Check if Vulnerable:

Check FortiWebManager version via web interface (System > Dashboard) or CLI command: get system status

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify version is updated to 7.2.1, 7.0.5, 6.3.1, 6.2.5, or 6.0.3 using same methods

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI command execution patterns
  • Multiple failed authentication attempts followed by successful access
  • Unexpected process creation or system modifications

Network Indicators:

  • Unusual HTTP requests to management interface from unexpected sources
  • CLI sessions from non-standard IP addresses
  • Traffic patterns indicating command and control communication

SIEM Query:

source="fortiwebmanager" AND (event_type="admin_login" OR event_type="cli_command") AND src_ip NOT IN [trusted_ips]

🔗 References

📤 Share & Export