CVE-2024-54019

4.8 MEDIUM

📋 TL;DR

This vulnerability in Fortinet FortiClient for Windows allows attackers to redirect VPN connections through DNS spoofing or other redirection methods due to improper certificate hostname validation. Attackers can intercept or redirect VPN traffic, potentially leading to man-in-the-middle attacks. Affected users include organizations using vulnerable FortiClient versions for VPN connectivity.

💻 Affected Systems

Products:
  • Fortinet FortiClient for Windows
Versions: 7.4.0, 7.2.0 through 7.2.6, and all 7.0.x versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects VPN functionality. Requires attacker to redirect DNS or network traffic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept all VPN traffic, steal credentials, inject malware, and access internal network resources as authenticated users.

🟠

Likely Case

Targeted attacks redirect specific users to malicious VPN endpoints, enabling credential theft and limited network access.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to potential credential exposure for redirected users.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires ability to manipulate DNS or network routing. No authentication needed to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.4.1, 7.2.7, and later versions

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-365

Restart Required: Yes

Instructions:

1. Download latest FortiClient version from Fortinet support portal. 2. Install update on all affected Windows endpoints. 3. Restart systems to apply changes. 4. Verify version is updated to 7.4.1, 7.2.7 or later.

🔧 Temporary Workarounds

DNS Security Controls

all

Implement DNSSEC, DNS filtering, and monitor for DNS spoofing attempts

Network Segmentation

all

Isolate VPN traffic and implement strict network access controls

🧯 If You Can't Patch

  • Monitor VPN connection logs for unusual endpoints or certificate mismatches
  • Implement certificate pinning or additional VPN authentication factors

🔍 How to Verify

Check if Vulnerable:

Check FortiClient version in About dialog or via command: FortiClient.exe --version

Check Version:

FortiClient.exe --version

Verify Fix Applied:

Verify version is 7.4.1, 7.2.7 or later. Test VPN connections with invalid certificates to ensure proper validation.

📡 Detection & Monitoring

Log Indicators:

  • VPN connection failures due to certificate errors
  • Connections to unexpected VPN endpoints
  • Multiple failed authentication attempts from same source

Network Indicators:

  • DNS queries for VPN endpoints from unusual sources
  • VPN traffic to non-standard IP addresses
  • SSL/TLS certificate mismatches in VPN connections

SIEM Query:

source="forticlient" AND (event="vpn_connection_failed" OR certificate_error="hostname_mismatch")

🔗 References

📤 Share & Export