CVE-2024-50570
📋 TL;DR
This vulnerability allows local authenticated users on Windows or Linux systems running affected FortiClient versions to retrieve VPN passwords via memory dump due to JavaScript garbage collection issues. The sensitive information is stored in cleartext in memory, making it accessible to users with local access. This affects FortiClient users across multiple versions on both Windows and Linux platforms.
💻 Affected Systems
- FortiClientWindows
- FortiClientLinux
📦 What is this software?
Forticlient by Fortinet
Forticlient by Fortinet
Forticlient by Fortinet
Forticlient by Fortinet
Forticlient by Fortinet
⚠️ Risk & Real-World Impact
Worst Case
An authenticated local attacker could extract VPN credentials, potentially gaining unauthorized access to corporate networks or sensitive resources protected by the VPN.
Likely Case
A malicious insider or compromised user account could harvest VPN passwords from memory, enabling lateral movement or data exfiltration through the VPN tunnel.
If Mitigated
With proper access controls and monitoring, the impact is limited to users who already have local system access, reducing the attack surface significantly.
🎯 Exploit Status
Exploitation requires local authenticated access and knowledge of memory analysis techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Windows: 7.4.2+, 7.2.7+, 7.0.14+; Linux: 7.4.3+, 7.2.8+, 7.0.14+
Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-23-278
Restart Required: Yes
Instructions:
1. Download latest FortiClient version from Fortinet support portal. 2. Install update on affected systems. 3. Restart systems to apply changes. 4. Verify version is updated.
🔧 Temporary Workarounds
Restrict Local Access
allLimit local authenticated access to systems running FortiClient to trusted users only.
Memory Protection Controls
allImplement controls to prevent memory dumping by unauthorized users.
🧯 If You Can't Patch
- Implement strict access controls to limit who can log into systems with FortiClient installed.
- Monitor for suspicious memory access or dumping activities on affected systems.
🔍 How to Verify
Check if Vulnerable:
Check FortiClient version: Windows - Open FortiClient GUI > About; Linux - Run 'forticlient --version' or check package manager.
Check Version:
Windows: Check GUI or registry; Linux: 'forticlient --version' or 'dpkg -l | grep forticlient' or 'rpm -qa | grep forticlient'
Verify Fix Applied:
Verify version is updated to patched versions: Windows 7.4.2+, 7.2.7+, 7.0.14+ or Linux 7.4.3+, 7.2.8+, 7.0.14+.
📡 Detection & Monitoring
Log Indicators:
- Unusual memory access patterns
- Process dumping activities
- Multiple failed authentication attempts followed by successful local login
Network Indicators:
- VPN connections from unusual locations or times after local system access
SIEM Query:
EventID=4688 OR ProcessName contains 'procdump' OR 'mimikatz' AND HostName contains affected systems