CVE-2024-47575

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in FortiManager allows unauthenticated attackers to execute arbitrary code or commands via specially crafted requests. It affects multiple versions of FortiManager and FortiManager Cloud across various release branches. Organizations using affected versions are at immediate risk of complete system compromise.

💻 Affected Systems

Products:
  • FortiManager
  • FortiManager Cloud
Versions: FortiManager 7.6.0, 7.4.0-7.4.4, 7.2.0-7.2.7, 7.0.0-7.0.12, 6.4.0-6.4.14, 6.2.0-6.2.12; FortiManager Cloud 7.4.1-7.4.4, 7.2.1-7.2.7, 7.0.1-7.0.12, 6.4.1-6.4.7
Operating Systems: FortiOS-based appliances
Default Config Vulnerable: ⚠️ Yes
Notes: All affected versions in default configuration are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, data exfiltration, lateral movement across network, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to configuration manipulation, credential theft, and deployment of malware or ransomware.

🟢

If Mitigated

Limited impact if network segmentation and strict access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - Directly exploitable without authentication via network requests.
🏢 Internal Only: HIGH - Even internally accessible systems are vulnerable to authenticated or unauthenticated attackers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiManager 7.6.1, 7.4.5, 7.2.8, 7.0.13, 6.4.15, 6.2.13; FortiManager Cloud 7.4.5, 7.2.8, 7.0.13, 6.4.8

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-423

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download appropriate patched version from Fortinet support portal. 3. Apply patch via FortiManager GUI or CLI. 4. Restart services. 5. Verify patch application and functionality.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to FortiManager management interfaces to trusted IP addresses only.

config system interface
edit <interface_name>
set allowaccess https ssh ping
set trusted-ip <trusted_ip_range>
end

Disable Unnecessary Services

all

Disable any unnecessary management services and protocols on FortiManager interfaces.

config system interface
edit <interface_name>
set allowaccess <minimal_required_protocols>
end

🧯 If You Can't Patch

  • Immediately isolate affected FortiManager systems from internet and untrusted networks
  • Implement strict network segmentation and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check FortiManager version via GUI (System > Dashboard) or CLI (get system status). Compare against affected versions list.

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify version is updated to patched version and check for any abnormal processes or connections.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Unexpected process execution
  • Configuration changes from unknown sources
  • Failed authentication followed by successful command execution

Network Indicators:

  • Unusual outbound connections from FortiManager
  • Traffic to suspicious IPs/domains
  • Anomalous protocol usage on management ports

SIEM Query:

source="fortimanager" AND (event_type="authentication" OR event_type="command_execution") AND result="success" AND user="unknown"

🔗 References

📤 Share & Export