CVE-2024-48885

5.3 MEDIUM

📋 TL;DR

This path traversal vulnerability (CWE-22) in multiple Fortinet products allows attackers to escalate privileges by sending specially crafted packets. Affected systems include FortiRecorder, FortiVoice, and FortiWeb across multiple versions. Successful exploitation could lead to unauthorized access to restricted directories and system files.

💻 Affected Systems

Products:
  • FortiRecorder
  • FortiVoice
  • FortiWeb
Versions: FortiRecorder 7.2.0-7.2.1, 7.0.0-7.0.4; FortiVoice 7.0.0-7.0.4, 6.4.0-6.4.9, 6.0 all; FortiWeb 7.6.0, 7.4.0-7.4.4, 7.2 all, 7.0 all, 6.4 all
Operating Systems: FortiOS-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: All affected versions in default configurations are vulnerable. The vulnerability requires network access to the affected services.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, allowing attackers to read sensitive files, modify configurations, install backdoors, or pivot to other systems.

🟠

Likely Case

Privilege escalation leading to unauthorized access to restricted directories, potentially exposing sensitive configuration files, logs, or credentials.

🟢

If Mitigated

Limited impact with proper network segmentation, strict access controls, and monitoring in place to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires sending specially crafted packets to vulnerable services. The advisory mentions 'specially crafted packets' but doesn't specify authentication requirements.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiRecorder 7.2.2, 7.0.5; FortiVoice 7.0.5, 6.4.10; FortiWeb 7.6.1, 7.4.5

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-259

Restart Required: Yes

Instructions:

1. Download the latest firmware from Fortinet support portal. 2. Backup current configuration. 3. Apply firmware update via web interface or CLI. 4. Reboot the device. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to affected devices to only trusted sources

Access Control Lists

all

Implement strict firewall rules to limit which IPs can communicate with vulnerable services

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to vulnerable services
  • Enable detailed logging and monitoring for suspicious file access patterns or privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check device version via web interface (System > Dashboard) or CLI (get system status)

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify firmware version is at or above patched versions: FortiRecorder 7.2.2+, 7.0.5+; FortiVoice 7.0.5+, 6.4.10+; FortiWeb 7.6.1+, 7.4.5+

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • Privilege escalation attempts
  • Access to restricted directories

Network Indicators:

  • Suspicious packet patterns to vulnerable services
  • Multiple failed directory traversal attempts

SIEM Query:

source="fortinet" AND (event_type="file_access" OR event_type="privilege_escalation") AND path="*../*"

🔗 References

📤 Share & Export