CVE-2024-26009

8.1 HIGH

📋 TL;DR

This CVE describes an authentication bypass vulnerability in Fortinet FortiOS, FortiProxy, and FortiPAM products that allows unauthenticated attackers to take control of managed devices. Attackers can exploit this by sending crafted FGFM requests if they know the FortiManager's serial number and the device is managed by FortiManager. Affected organizations include those using vulnerable versions of these Fortinet products in managed configurations.

💻 Affected Systems

Products:
  • Fortinet FortiOS
  • Fortinet FortiProxy
  • Fortinet FortiPAM
Versions: FortiOS 6.4.0-6.4.15 and before 6.2.16; FortiProxy 7.4.0-7.4.2, 7.2.0-7.2.8 and before 7.0.15; FortiPAM before 1.2.0
Operating Systems: FortiOS (proprietary)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices managed by FortiManager. Requires attacker knowledge of FortiManager serial number.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of managed network devices, allowing attackers to reconfigure firewalls, intercept traffic, pivot to internal networks, and establish persistent access.

🟠

Likely Case

Unauthorized administrative access to network security devices, enabling traffic monitoring, rule modification, and credential harvesting.

🟢

If Mitigated

Limited impact if devices are not managed by FortiManager or if network segmentation prevents access to management interfaces.

🌐 Internet-Facing: HIGH if management interfaces are exposed to internet, as exploit requires no authentication and has low complexity.
🏢 Internal Only: MEDIUM to HIGH depending on network segmentation and attacker's ability to reach management interfaces internally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of FortiManager serial number and ability to send crafted FGFM requests to vulnerable devices.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiOS 6.4.16+, 6.2.16+; FortiProxy 7.4.3+, 7.2.9+, 7.0.15+; FortiPAM 1.2.0+

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-042

Restart Required: Yes

Instructions:

1. Download appropriate firmware version from Fortinet support portal. 2. Backup current configuration. 3. Upload firmware via web GUI or CLI. 4. Reboot device. 5. Verify successful upgrade and configuration restoration.

🔧 Temporary Workarounds

Disable FortiManager Management

all

Remove devices from FortiManager management to eliminate attack vector

config system central-management
set type none
end

Restrict Management Interface Access

all

Apply strict network ACLs to limit access to management interfaces

config firewall address
edit "MGMT_ACL"
set subnet 192.168.1.0 255.255.255.0
next
config firewall policy
edit 0
set srcintf "any"
set dstintf "mgmt"
set srcaddr "MGMT_ACL"
set action accept
set schedule "always"
set service "ALL"
end

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate management interfaces from untrusted networks
  • Monitor for unusual FGFM traffic patterns and failed authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check device version via CLI: 'get system status' and verify if in affected range. Check if managed by FortiManager: 'diagnose debug config-error-log read'

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify version is patched: 'get system status | grep Version'. Confirm FortiManager connectivity still functions properly.

📡 Detection & Monitoring

Log Indicators:

  • Unusual FGFM connection attempts from unexpected sources
  • Authentication bypass events in security logs
  • Configuration changes from unauthenticated sources

Network Indicators:

  • FGFM protocol traffic from unauthorized IP addresses
  • Management interface connections from unexpected sources

SIEM Query:

source="fortigate" AND ("FGFM" OR "authentication bypass") AND severity>=high

🔗 References

📤 Share & Export