CVE-2024-33510

4.3 MEDIUM

📋 TL;DR

This CVE describes an injection vulnerability in Fortinet's SSL-VPN web user interface that could allow remote unauthenticated attackers to perform phishing attempts. The vulnerability affects FortiOS, FortiProxy, and FortiSASE products across multiple versions. Attackers can craft malicious requests to manipulate web output and potentially trick users into revealing credentials or other sensitive information.

💻 Affected Systems

Products:
  • FortiOS
  • FortiProxy
  • FortiSASE
Versions: FortiOS: 7.4.3 and below, 7.2.8 and below, 7.0.16 and below; FortiProxy: 7.4.3 and below, 7.2.9 and below, 7.0.16 and below; FortiSASE: 24.2.b
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects SSL-VPN web user interface. Requires SSL-VPN to be enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Successful phishing campaigns leading to credential theft, account compromise, and potential lateral movement within the network.

🟠

Likely Case

Phishing attempts targeting SSL-VPN users, potentially leading to some credential harvesting and limited account compromise.

🟢

If Mitigated

Minimal impact with proper user awareness training and multi-factor authentication in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting specific requests to the SSL-VPN interface. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiOS: 7.4.4, 7.2.9, 7.0.17; FortiProxy: 7.4.4, 7.2.10, 7.0.17; FortiSASE: 24.3

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-033

Restart Required: Yes

Instructions:

1. Download the appropriate firmware version from Fortinet support portal. 2. Backup current configuration. 3. Upload and install the firmware update via web interface or CLI. 4. Reboot the device after installation completes.

🔧 Temporary Workarounds

Disable SSL-VPN

all

Temporarily disable SSL-VPN access if not required for operations.

config vpn ssl settings
set status disable
end

Restrict SSL-VPN Access

all

Limit SSL-VPN access to specific source IP addresses using firewall policies.

config firewall policy
edit <policy_id>
set srcaddr <trusted_ips>
end

🧯 If You Can't Patch

  • Implement network segmentation to isolate SSL-VPN traffic
  • Deploy web application firewall (WAF) with injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check FortiOS/FortiProxy version via web interface or CLI: 'get system status' and compare against affected versions.

Check Version:

get system status | grep Version

Verify Fix Applied:

After patching, verify version is above affected ranges: 'get system status' should show patched versions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SSL-VPN authentication patterns
  • Multiple failed login attempts from single IP
  • Suspicious URL patterns in web logs

Network Indicators:

  • Unusual traffic patterns to SSL-VPN interface
  • Requests with crafted parameters to SSL-VPN endpoints

SIEM Query:

source="fortigate" AND (url="*/remote/login*" OR url="*/sslvpn*") AND (status=200 OR status=302) AND user_agent="*" | stats count by src_ip, url

🔗 References

📤 Share & Export