CVE-2024-23669

6.5 MEDIUM

📋 TL;DR

CVE-2024-23669 is an improper authorization vulnerability in Fortinet FortiWebManager that allows attackers to execute unauthorized code or commands via HTTP requests or CLI. This affects organizations running vulnerable versions of FortiWebManager, potentially leading to system compromise.

💻 Affected Systems

Products:
  • Fortinet FortiWebManager
Versions: 7.2.0, 7.0.0-7.0.4, 6.3.0, 6.2.3-6.2.4, 6.0.2
Operating Systems: FortiOS-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: All installations running affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining administrative control, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Unauthorized command execution leading to configuration changes, service disruption, or data access.

🟢

If Mitigated

Limited impact due to network segmentation, proper access controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH - HTTP-based exploitation vector makes internet-facing instances particularly vulnerable to remote attacks.
🏢 Internal Only: MEDIUM - CLI exploitation requires some level of access, but internal attackers could still leverage the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access (HTTP or CLI), but the vulnerability itself is straightforward to exploit once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2.1, 7.0.5, 6.3.1, 6.2.5, 6.0.3

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-23-222

Restart Required: Yes

Instructions:

1. Download the appropriate patched version from Fortinet support portal. 2. Backup current configuration. 3. Apply the firmware update via web interface or CLI. 4. Reboot the system. 5. Verify successful update.

🔧 Temporary Workarounds

Restrict Network Access

all

Limit access to FortiWebManager management interface to trusted IP addresses only.

config system interface
edit <interface_name>
set allowaccess https ssh
set trust-ip-1 <trusted_ip>

Enable Strict Authentication

all

Enforce multi-factor authentication and strong password policies for all administrative accounts.

config system admin
edit <admin_user>
set two-factor enable
set password <strong_password>

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FortiWebManager from untrusted networks
  • Enable comprehensive logging and monitoring for suspicious HTTP requests or CLI commands

🔍 How to Verify

Check if Vulnerable:

Check FortiWebManager version via web interface (System > Dashboard) or CLI command 'get system status'

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify version is updated to patched version (7.2.1, 7.0.5, 6.3.1, 6.2.5, or 6.0.3) using same methods

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to management interface
  • Unexpected CLI command execution
  • Failed authorization attempts followed by successful commands

Network Indicators:

  • HTTP traffic to FortiWebManager management interface from unexpected sources
  • Unusual command patterns in management traffic

SIEM Query:

source="fortiwebmanager" AND (event_type="auth_failure" OR event_type="command_execution")

🔗 References

📤 Share & Export