CVE-2024-47571

8.1 HIGH

📋 TL;DR

This vulnerability in Fortinet FortiManager allows attackers with valid credentials to gain improper access to FortiGate devices through an operation on a resource after expiration or release. It affects organizations using FortiManager for centralized management of FortiGate firewalls. Attackers could potentially bypass intended access controls.

💻 Affected Systems

Products:
  • Fortinet FortiManager
Versions: 6.4.12 through 7.4.0
Operating Systems: FortiOS-based appliances
Default Config Vulnerable: ⚠️ Yes
Notes: Requires valid credentials to exploit. Affects FortiManager instances managing FortiGate devices.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain administrative access to managed FortiGate devices, allowing them to modify firewall rules, intercept traffic, or deploy malware across the network.

🟠

Likely Case

Privileged users or attackers with stolen credentials could escalate privileges and access FortiGate devices beyond their intended authorization level.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to authorized users making unintended configuration changes.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires valid credentials and knowledge of the FortiManager-FortiGate management relationship.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiManager 7.4.1 or later

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-239

Restart Required: No

Instructions:

1. Backup FortiManager configuration. 2. Download and install FortiManager 7.4.1 or later from Fortinet support portal. 3. Verify installation and test management functionality.

🔧 Temporary Workarounds

Restrict FortiManager Access

all

Limit FortiManager access to only trusted administrators and implement strict credential policies.

Monitor FortiGate Access

all

Enable detailed logging on FortiGate devices for all administrative access and configuration changes.

🧯 If You Can't Patch

  • Implement multi-factor authentication for all FortiManager administrative accounts
  • Segment FortiManager management network and restrict access to management interfaces

🔍 How to Verify

Check if Vulnerable:

Check FortiManager version via GUI (System > Dashboard) or CLI (get system status). If version is between 6.4.12 and 7.4.0 inclusive, system is vulnerable.

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify FortiManager version is 7.4.1 or later. Test FortiGate management functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected FortiGate configuration changes
  • FortiManager authentication from unusual sources
  • FortiGate administrative access via FortiManager outside normal patterns

Network Indicators:

  • Unusual FortiManager to FortiGate communication patterns
  • Configuration changes to FortiGate devices via FortiManager API

SIEM Query:

source="fortimanager" AND (event_type="config_change" OR event_type="admin_login") AND dest_device="fortigate"

🔗 References

📤 Share & Export