CVE-2024-46668

7.5 HIGH

📋 TL;DR

This CVE describes a resource exhaustion vulnerability in FortiOS where an unauthenticated remote attacker can cause a denial-of-service by uploading multiple large files, consuming all available system memory. The vulnerability affects FortiOS versions 6.4.0-6.4.15, 7.0.0-7.0.15, 7.2.0-7.2.8, and 7.4.0-7.4.4. Organizations using these vulnerable FortiOS versions on their FortiGate devices are at risk.

💻 Affected Systems

Products:
  • FortiOS
Versions: 6.4.0 through 6.4.15, 7.0.0 through 7.0.15, 7.2.0 through 7.2.8, 7.4.0 through 7.4.4
Operating Systems: FortiOS
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations with file upload functionality enabled are vulnerable. The vulnerability affects the underlying FortiOS operating system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash and denial-of-service, rendering the FortiGate device unavailable and disrupting all network traffic passing through it.

🟠

Likely Case

Degraded performance leading to network disruption, potential service outages, and possible bypass of security controls during memory exhaustion.

🟢

If Mitigated

Minimal impact with proper network segmentation, rate limiting, and monitoring in place to detect and block excessive upload attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and involves simple repeated file uploads, making this relatively easy to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiOS 7.4.5, 7.2.9, 7.0.16, 6.4.16

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-219

Restart Required: No

Instructions:

1. Download the appropriate firmware version from the Fortinet support portal. 2. Backup current configuration. 3. Upload and install the firmware update via GUI or CLI. 4. Verify the update was successful.

🔧 Temporary Workarounds

Implement upload rate limiting

all

Configure rate limiting for file uploads to prevent excessive requests from a single source.

config firewall policy
edit <policy_id>
set utm-status enable
set av-profile <profile_name>
set dlp-sensor <sensor_name>
set ips-sensor <sensor_name>
set application-list <list_name>
set logtraffic all
next
end

Restrict file upload sources

all

Limit file upload functionality to trusted IP addresses or networks only.

config firewall policy
edit <policy_id>
set srcaddr <trusted_address>
set dstaddr <destination_address>
set service <service_name>
set action accept
next
end

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable devices from untrusted networks.
  • Deploy network-based intrusion prevention systems (IPS) to detect and block excessive file upload attempts.

🔍 How to Verify

Check if Vulnerable:

Check FortiOS version via CLI: 'get system status' or GUI: System > Dashboard > System Information.

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify the installed version is 7.4.5, 7.2.9, 7.0.16, or 6.4.16 or later using 'get system status' command.

📡 Detection & Monitoring

Log Indicators:

  • Multiple large file upload attempts from single source IP
  • Memory usage spikes in system logs
  • Denial-of-service alerts in event logs

Network Indicators:

  • Unusually high volume of file upload traffic to FortiGate management interfaces
  • Multiple large HTTP POST requests to upload endpoints

SIEM Query:

source="fortigate" (event_type="traffic" AND file_size>10000000) | stats count by src_ip

🔗 References

📤 Share & Export