CVE-2024-36508

6.0 MEDIUM

📋 TL;DR

This path traversal vulnerability in Fortinet FortiManager and FortiAnalyzer allows authenticated admin users with diagnose privileges to delete arbitrary files on the system. It affects specific versions of both products, potentially enabling file system manipulation and system disruption.

💻 Affected Systems

Products:
  • Fortinet FortiManager
  • Fortinet FortiAnalyzer
Versions: FortiManager/FortiAnalyzer 7.4.0 through 7.4.2 and versions before 7.2.5
Operating Systems: FortiOS-based appliances
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated admin user with diagnose privileges; CLI access needed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious admin could delete critical system files, configuration files, or log files, causing system instability, service disruption, or complete system compromise.

🟠

Likely Case

Privileged users could accidentally or intentionally delete important files, leading to configuration loss, audit trail destruction, or operational issues.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized administrative actions that can be audited and reversed.

🌐 Internet-Facing: MEDIUM - While exploitation requires authentication, internet-facing management interfaces increase attack surface for credential compromise.
🏢 Internal Only: HIGH - Internal privileged users already have access and could exploit this vulnerability without external attack vectors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated admin access with diagnose privileges; path traversal techniques are well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiManager/FortiAnalyzer 7.4.3 or 7.2.5 and later

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-147

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download and install FortiManager/FortiAnalyzer version 7.4.3 or 7.2.5 from Fortinet support portal. 3. Apply firmware update through web interface or CLI. 4. Reboot device after installation. 5. Verify version update.

🔧 Temporary Workarounds

Restrict Diagnose Privileges

all

Remove diagnose privileges from admin accounts that don't require them, limiting potential exploiters.

config system admin
edit <admin_username>
unset accprofile
set accprofile <restricted_profile>
end

Implement CLI Access Controls

all

Restrict CLI access to only necessary administrative users and implement session logging.

config system admin
edit <admin_username>
set trusthost1 <trusted_ip>
set trusthost2 <trusted_ip>
end

🧯 If You Can't Patch

  • Implement strict access controls and monitor all admin CLI sessions
  • Regularly audit file system integrity and maintain comprehensive backups

🔍 How to Verify

Check if Vulnerable:

Check current version via CLI: 'get system status' and verify if version is within affected range (7.4.0-7.4.2 or <7.2.5).

Check Version:

get system status | grep Version

Verify Fix Applied:

After patching, run 'get system status' to confirm version is 7.4.3+ or 7.2.5+. Test CLI file operations are properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • CLI session logs showing file deletion commands
  • Admin activity logs with diagnose privilege usage
  • File system audit logs showing unexpected file deletions

Network Indicators:

  • Unusual CLI session patterns from admin accounts
  • Multiple file deletion operations in short timeframes

SIEM Query:

source="fortimanager" OR source="fortianalyzer" AND (event_type="cli_command" AND command="*delete*" OR command="*rm*")

🔗 References

📤 Share & Export