CVE-2024-50570

5.0 MEDIUM

📋 TL;DR

This vulnerability allows local authenticated users on Windows or Linux systems running affected FortiClient versions to retrieve VPN passwords via memory dump due to JavaScript garbage collection issues. The sensitive information is stored in cleartext in memory, making it accessible to users with local access. This affects FortiClient users across multiple versions on both Windows and Linux platforms.

💻 Affected Systems

Products:
  • FortiClientWindows
  • FortiClientLinux
Versions: Windows: 7.4.0-7.4.1, 7.2.0-7.2.6, 7.0.0-7.0.13; Linux: 7.4.0-7.4.2, 7.2.0-7.2.7, 7.0.0-7.0.13
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations of affected versions are vulnerable. Requires local authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated local attacker could extract VPN credentials, potentially gaining unauthorized access to corporate networks or sensitive resources protected by the VPN.

🟠

Likely Case

A malicious insider or compromised user account could harvest VPN passwords from memory, enabling lateral movement or data exfiltration through the VPN tunnel.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to users who already have local system access, reducing the attack surface significantly.

🌐 Internet-Facing: LOW - This requires local authenticated access, not remote exploitation.
🏢 Internal Only: MEDIUM - Local authenticated users can exploit this, making it relevant for insider threats or compromised accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires local authenticated access and memory dumping tools.

Exploitation requires local authenticated access and knowledge of memory analysis techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Windows: 7.4.2+, 7.2.7+, 7.0.14+; Linux: 7.4.3+, 7.2.8+, 7.0.14+

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-23-278

Restart Required: Yes

Instructions:

1. Download latest FortiClient version from Fortinet support portal. 2. Install update on affected systems. 3. Restart systems to apply changes. 4. Verify version is updated.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local authenticated access to systems running FortiClient to trusted users only.

Memory Protection Controls

all

Implement controls to prevent memory dumping by unauthorized users.

🧯 If You Can't Patch

  • Implement strict access controls to limit who can log into systems with FortiClient installed.
  • Monitor for suspicious memory access or dumping activities on affected systems.

🔍 How to Verify

Check if Vulnerable:

Check FortiClient version: Windows - Open FortiClient GUI > About; Linux - Run 'forticlient --version' or check package manager.

Check Version:

Windows: Check GUI or registry; Linux: 'forticlient --version' or 'dpkg -l | grep forticlient' or 'rpm -qa | grep forticlient'

Verify Fix Applied:

Verify version is updated to patched versions: Windows 7.4.2+, 7.2.7+, 7.0.14+ or Linux 7.4.3+, 7.2.8+, 7.0.14+.

📡 Detection & Monitoring

Log Indicators:

  • Unusual memory access patterns
  • Process dumping activities
  • Multiple failed authentication attempts followed by successful local login

Network Indicators:

  • VPN connections from unusual locations or times after local system access

SIEM Query:

EventID=4688 OR ProcessName contains 'procdump' OR 'mimikatz' AND HostName contains affected systems

🔗 References

📤 Share & Export