CVE-2024-52962

5.3 MEDIUM

📋 TL;DR

An unauthenticated remote attacker can inject malicious content into FortiAnalyzer and FortiManager logs via crafted login requests. This log pollution vulnerability affects all supported versions of both products when exposed to network access.

💻 Affected Systems

Products:
  • FortiAnalyzer
  • FortiManager
Versions: FortiAnalyzer: 7.6.1 and below, 7.4.5 and below, 7.2.8 and below, 7.0.13 and below. FortiManager: 7.6.1 and below, 7.4.5 and below, 7.2.8 and below, 7.0.12 and below.
Operating Systems: FortiOS-based appliances
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations with login functionality enabled are affected. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Log poisoning could enable log injection attacks, potentially obscuring other malicious activities or causing log analysis tools to misinterpret log data.

🟠

Likely Case

Attackers pollute logs with misleading entries, complicating forensic investigations and potentially triggering false alerts in monitoring systems.

🟢

If Mitigated

With proper log validation and monitoring, impact is limited to log clutter without system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the login interface but no authentication. Simple HTTP requests can trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiAnalyzer: 7.6.2, 7.4.6, 7.2.9, 7.0.14. FortiManager: 7.6.2, 7.4.6, 7.2.9, 7.0.13.

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-453

Restart Required: Yes

Instructions:

1. Download appropriate firmware version from Fortinet support portal. 2. Backup configuration. 3. Upload firmware via web GUI or CLI. 4. Reboot device after installation.

🔧 Temporary Workarounds

Restrict network access

all

Limit access to FortiAnalyzer/FortiManager management interfaces to trusted networks only.

Configure firewall rules to restrict access to management IP/ports

Enable authentication requirements

all

Ensure all login attempts require authentication (though vulnerability is unauthenticated, this reduces attack surface).

config system admin
edit admin
set accprofile super_admin
set password ENC <encrypted_password>
next
end

🧯 If You Can't Patch

  • Implement network segmentation to isolate management interfaces from untrusted networks.
  • Deploy log monitoring with anomaly detection to identify log pollution attempts.

🔍 How to Verify

Check if Vulnerable:

Check current firmware version via web GUI (System > Dashboard) or CLI (get system status). Compare against affected versions.

Check Version:

get system status | grep Version

Verify Fix Applied:

Confirm firmware version matches patched versions listed in vendor advisory. Test login attempts with special characters to verify logs are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual log entries containing unexpected characters or patterns in authentication logs
  • Multiple failed login attempts with crafted payloads

Network Indicators:

  • HTTP requests to login endpoints containing special characters or encoding attempts
  • Unusual traffic patterns to management interfaces

SIEM Query:

source="fortianalyzer" OR source="fortimanager" AND (event_type="login" OR event_type="authentication") AND message="*%*" OR message="*<*" OR message="*>*"

🔗 References

📤 Share & Export