CVE-2024-36513

8.2 HIGH

📋 TL;DR

This vulnerability in FortiClient for Windows allows authenticated users to escalate privileges through Lua auto patch scripts. It affects FortiClient Windows versions 7.2.4 and below, 7.0.12 and below, and all 6.4 versions. Attackers with local access can gain SYSTEM-level privileges.

💻 Affected Systems

Products:
  • FortiClient for Windows
Versions: 7.2.4 and below, 7.0.12 and below, all 6.4 versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows versions of FortiClient. Requires authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains SYSTEM privileges, enabling complete system compromise, installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Malicious insider or compromised user account escalates to SYSTEM privileges to install backdoors, disable security controls, or access sensitive data.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to isolated systems with rapid detection and containment.

🌐 Internet-Facing: LOW - Exploitation requires local authenticated access, not remote.
🏢 Internal Only: HIGH - Any authenticated user on affected Windows systems can potentially exploit this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but appears straightforward based on vulnerability description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiClient 7.2.5, 7.0.13, and later versions

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-144

Restart Required: Yes

Instructions:

1. Download latest FortiClient version from Fortinet support portal. 2. Uninstall current version. 3. Install updated version. 4. Restart system.

🔧 Temporary Workarounds

Restrict Lua script execution

windows

Disable or restrict Lua auto patch script functionality if not required

Limit local user privileges

windows

Implement least privilege access controls to reduce attack surface

🧯 If You Can't Patch

  • Implement strict access controls to limit who can log into affected systems
  • Enable detailed logging and monitoring for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check FortiClient version via: Control Panel > Programs > Programs and Features, or run 'wmic product get name,version' in command prompt

Check Version:

wmic product where "name like '%FortiClient%'" get name,version

Verify Fix Applied:

Verify installed version is 7.2.5+, 7.0.13+, or not 6.4.x

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Lua script execution in FortiClient logs
  • SYSTEM account activity from non-admin users

Network Indicators:

  • Unusual outbound connections from affected systems post-exploit

SIEM Query:

EventID=4688 AND ProcessName LIKE '%forticlient%' AND NewProcessName LIKE '%cmd%' OR '%powershell%'

🔗 References

📤 Share & Export