CVE-2024-45331

7.3 HIGH

📋 TL;DR

This CVE describes an incorrect privilege assignment vulnerability in Fortinet FortiAnalyzer, FortiManager, and FortiAnalyzer Cloud products. Attackers can execute specific shell commands to escalate privileges, potentially gaining administrative control. Organizations running affected versions of these Fortinet management platforms are at risk.

💻 Affected Systems

Products:
  • FortiAnalyzer
  • FortiManager
  • FortiAnalyzer Cloud
Versions: FortiAnalyzer: 7.4.0-7.4.3, 7.2.0-7.2.5, 7.0.0-7.0.13, 6.4.0-6.4.15; FortiManager: 7.4.0-7.4.2, 7.2.0-7.2.5, 7.0.0-7.0.13, 6.4.0-6.4.15; FortiAnalyzer Cloud: 7.4.1-7.4.2, 7.2.1-7.2.6, 7.0.1-7.0.13, 6.4.1-6.4.7
Operating Systems: FortiOS-based appliances
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise where an attacker gains administrative privileges, accesses sensitive network data, modifies configurations, and potentially uses the platform as a pivot point to attack other systems.

🟠

Likely Case

Privilege escalation allowing attackers to bypass intended access controls, view sensitive logs and configurations, and potentially modify system settings.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and monitoring are in place, though the vulnerability still presents a security risk.

🌐 Internet-Facing: HIGH - These management platforms are often exposed to manage distributed networks, making them attractive targets for attackers.
🏢 Internal Only: MEDIUM - While less exposed than internet-facing systems, internal attackers or compromised accounts could still exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to execute specific shell commands. The advisory does not specify if the vulnerability is being actively exploited.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiAnalyzer: 7.4.4, 7.2.6, 7.0.14, 6.4.16; FortiManager: 7.4.3, 7.2.6, 7.0.14, 6.4.16; FortiAnalyzer Cloud: 7.4.3, 7.2.7, 7.0.14, 6.4.8

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-127

Restart Required: No

Instructions:

1. Log into the Fortinet management platform. 2. Navigate to System Settings > Firmware. 3. Upload and install the patched firmware version. 4. Verify the installation completes successfully.

🔧 Temporary Workarounds

Restrict Shell Access

all

Limit shell command execution to only necessary administrative users through role-based access controls.

config system admin
edit <username>
set accprofile "prof_admin"
end

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Fortinet management platforms from other critical systems.
  • Enforce multi-factor authentication and monitor for unusual administrative activity or shell command execution.

🔍 How to Verify

Check if Vulnerable:

Check the current firmware version in System > Dashboard > Status. Compare against affected version ranges.

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify the firmware version matches or exceeds the patched versions listed in the vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual shell command execution patterns
  • Privilege escalation attempts in audit logs
  • Administrative account creation or modification

Network Indicators:

  • Unexpected administrative access to management interfaces
  • Anomalous traffic from management platforms

SIEM Query:

source="fortinet" AND (event_type="shell" OR cmd="*sh*") AND user!="admin"

🔗 References

📤 Share & Export