CVE-2024-32116

5.1 MEDIUM

📋 TL;DR

This vulnerability allows privileged attackers to delete arbitrary files from the underlying filesystem via crafted CLI requests in affected Fortinet products. It affects FortiManager, FortiAnalyzer, and FortiAnalyzer-BigData systems running vulnerable versions. Attackers with administrative CLI access can exploit relative path traversal flaws to delete critical system files.

💻 Affected Systems

Products:
  • FortiManager
  • FortiAnalyzer
  • FortiAnalyzer-BigData
Versions: FortiManager 7.4.0-7.4.2, <7.2.5; FortiAnalyzer 7.4.0-7.4.2, <7.2.5; FortiAnalyzer-BigData 7.4.0, <7.2.7
Operating Systems: FortiOS-based appliances
Default Config Vulnerable: ⚠️ Yes
Notes: Requires privileged CLI access; not exploitable via web interface or unauthenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical operating system files, configuration files, or security controls leading to denial of service or privilege escalation.

🟠

Likely Case

Unauthorized deletion of configuration files, logs, or application data causing service disruption, data loss, or operational impact.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, though file deletion could still occur if attacker gains privileged CLI access.

🌐 Internet-Facing: MEDIUM - While exploitation requires privileged CLI access, internet-facing management interfaces could be targeted if credentials are compromised.
🏢 Internal Only: HIGH - Internal attackers with privileged access or compromised administrative accounts can exploit this vulnerability to delete critical files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple path traversal exploitation once privileged CLI access is obtained.

Exploitation requires administrative CLI credentials; no public exploit code available as of advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiManager 7.4.3 or 7.2.5; FortiAnalyzer 7.4.3 or 7.2.5; FortiAnalyzer-BigData 7.2.7

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-099

Restart Required: Yes

Instructions:

1. Backup configuration and data. 2. Download appropriate firmware from Fortinet support portal. 3. Upload firmware to device via GUI or CLI. 4. Install update following vendor documentation. 5. Reboot device after installation completes.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit administrative CLI access to trusted users only and implement strong authentication controls.

config system admin
edit <admin_user>
set accprofile "restricted_profile"
set trusthost1 <trusted_ip>
end

Implement Network Segmentation

all

Isolate management interfaces from untrusted networks and implement strict firewall rules.

🧯 If You Can't Patch

  • Implement strict access controls and monitor all CLI sessions for suspicious file deletion commands.
  • Deploy file integrity monitoring to detect unauthorized file deletions and maintain comprehensive backups.

🔍 How to Verify

Check if Vulnerable:

Check system version via CLI: 'get system status' and compare with affected versions list.

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify installed version is equal to or greater than patched versions: FortiManager 7.4.3/7.2.5, FortiAnalyzer 7.4.3/7.2.5, FortiAnalyzer-BigData 7.2.7.

📡 Detection & Monitoring

Log Indicators:

  • CLI session logs showing file deletion commands with path traversal patterns (../ sequences)
  • System logs showing unexpected file deletions or permission errors

Network Indicators:

  • Unusual CLI traffic patterns from non-standard sources
  • Multiple failed authentication attempts followed by successful CLI access

SIEM Query:

source="fortinet" AND (event_type="cli_command" AND command="delete" AND path="*../*") OR (event_type="file_deletion" AND user="admin")

🔗 References

📤 Share & Export