CVE-2024-54024

7.2 HIGH

📋 TL;DR

This OS command injection vulnerability in Fortinet FortiIsolator allows attackers with super-admin privileges and CLI access to execute arbitrary commands via crafted HTTP requests. It affects FortiIsolator versions before 2.4.6. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Fortinet FortiIsolator
Versions: All versions before 2.4.6
Operating Systems: FortiOS-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have super-admin profile and CLI access to exploit

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to execute arbitrary commands, install malware, pivot to other systems, and exfiltrate sensitive data.

🟠

Likely Case

Privileged attacker with existing access escalates privileges to execute unauthorized commands, potentially gaining persistent access or disrupting services.

🟢

If Mitigated

With proper access controls and network segmentation, impact limited to isolated system with no critical data exposure.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with super-admin privileges

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.6

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-397

Restart Required: Yes

Instructions:

1. Download FortiIsolator version 2.4.6 from Fortinet support portal. 2. Backup current configuration. 3. Upload and install the new firmware. 4. Reboot the device. 5. Verify successful upgrade.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit CLI access to only necessary administrative personnel and implement strict access controls

Network Segmentation

all

Isolate FortiIsolator management interface from untrusted networks

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FortiIsolator from critical systems
  • Enforce least privilege access controls and monitor all super-admin account activity

🔍 How to Verify

Check if Vulnerable:

Check FortiIsolator version via CLI: 'get system status' and verify version is below 2.4.6

Check Version:

get system status | grep Version

Verify Fix Applied:

After patching, verify version is 2.4.6 or higher using 'get system status' command

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI command execution patterns
  • Multiple failed authentication attempts followed by successful super-admin login
  • HTTP requests with suspicious command injection patterns

Network Indicators:

  • Unusual outbound connections from FortiIsolator management interface
  • HTTP requests containing shell metacharacters or command injection patterns

SIEM Query:

source="fortiisolator" AND (event_type="cli_command" AND command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*)")

🔗 References

📤 Share & Export