CVE-2024-36510

5.3 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to enumerate valid user accounts on Fortinet products by observing differences in login response behavior. Attackers can identify which usernames exist in the system, facilitating targeted credential attacks. Affected systems include FortiClientEMS and FortiSOAR across multiple versions.

💻 Affected Systems

Products:
  • FortiClientEMS
  • FortiSOAR
Versions: FortiClientEMS: 7.4.0, 7.2.0-7.2.4, 7.0 all; FortiSOAR: 7.5.0, 7.4.0-7.4.4, 7.3.0-7.3.2, 7.2 all, 7.0 all, 6.4 all
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers build a complete list of valid usernames, then conduct targeted password attacks leading to account compromise and potential lateral movement.

🟠

Likely Case

Attackers identify administrative or service accounts, then attempt credential stuffing or brute-force attacks against those specific accounts.

🟢

If Mitigated

Attackers can enumerate users but cannot proceed further due to strong authentication controls like MFA and account lockout policies.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only network access to the login endpoint and ability to observe response differences.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiClientEMS 7.4.1, 7.2.5, 7.0.10; FortiSOAR 7.5.1, 7.4.5, 7.3.3, 7.2.3, 7.0.3, 6.4.5

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-071

Restart Required: Yes

Instructions:

1. Download appropriate patch version from Fortinet support portal. 2. Backup current configuration. 3. Apply patch following vendor instructions. 4. Restart services. 5. Verify patch installation.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict access to login endpoints to trusted IP ranges only

Rate Limiting

all

Implement rate limiting on authentication endpoints to slow enumeration

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to affected systems
  • Enable multi-factor authentication for all user accounts

🔍 How to Verify

Check if Vulnerable:

Test login endpoint with valid and invalid usernames; observe if response differs (requires ethical testing authorization)

Check Version:

Check web interface or CLI for version information specific to each product

Verify Fix Applied:

After patching, test that both valid and invalid usernames return identical response patterns

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts with different usernames from same source
  • Unusual pattern of authentication requests

Network Indicators:

  • High volume of POST requests to login endpoints
  • Requests from unexpected IP ranges

SIEM Query:

source="forticlientems" OR source="fortisoar" AND (event_type="authentication" OR url_path="/login") | stats count by src_ip, username | where count > threshold

🔗 References

📤 Share & Export