CVE-2024-32118

6.7 MEDIUM

📋 TL;DR

This CVE describes OS command injection vulnerabilities in Fortinet FortiManager and FortiAnalyzer products. Authenticated privileged attackers can execute arbitrary commands via crafted CLI requests, potentially leading to full system compromise. Affected organizations using vulnerable versions of these network management and analytics platforms are at risk.

💻 Affected Systems

Products:
  • Fortinet FortiManager
  • Fortinet FortiAnalyzer
  • Fortinet FortiAnalyzer-BigData
Versions: FortiManager: 7.4.0 through 7.4.2 and before 7.2.5; FortiAnalyzer: 7.4.0 through 7.4.2 and before 7.2.5; FortiAnalyzer-BigData: before 7.4.0
Operating Systems: FortiOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated privileged access to CLI interface. Default configurations with admin access are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with attacker gaining root-level access, installing persistent backdoors, exfiltrating sensitive network configuration data, and pivoting to other network segments.

🟠

Likely Case

Privilege escalation leading to unauthorized configuration changes, data theft, and potential lateral movement within the network management infrastructure.

🟢

If Mitigated

Limited impact due to restricted CLI access, network segmentation, and proper authentication controls preventing unauthorized users from reaching vulnerable interfaces.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated privileged access, but the command injection itself is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiManager/FortiAnalyzer 7.4.3 or 7.2.5; FortiAnalyzer-BigData 7.4.0

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-116

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download appropriate firmware from Fortinet support portal. 3. Upload firmware to device via GUI or CLI. 4. Install update following vendor documentation. 5. Reboot device after installation completes.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit CLI access to only trusted administrative users and implement strict access controls

config system admin
edit <admin_user>
set accprofile "super_admin"
set trusthost1 <trusted_ip> <trusted_mask>
end

Implement Network Segmentation

all

Isolate management interfaces from general network access

🧯 If You Can't Patch

  • Implement strict access controls to limit CLI access to only essential administrative personnel
  • Monitor CLI access logs for suspicious activity and implement network segmentation to isolate management interfaces

🔍 How to Verify

Check if Vulnerable:

Check current firmware version via GUI (System > Dashboard) or CLI (get system status)

Check Version:

get system status | grep Version

Verify Fix Applied:

Confirm firmware version is 7.4.3 or 7.2.5 for FortiManager/FortiAnalyzer, or 7.4.0 for FortiAnalyzer-BigData

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI command patterns
  • Multiple failed authentication attempts followed by successful CLI access
  • Commands containing shell metacharacters in CLI logs

Network Indicators:

  • Unexpected outbound connections from management interfaces
  • Anomalous traffic patterns from FortiManager/FortiAnalyzer devices

SIEM Query:

source="fortimanager" OR source="fortianalyzer" AND (event_type="cli_command" AND command=~"*[;&|`$()]*")

🔗 References

📤 Share & Export