CVE-2024-55597

5.5 MEDIUM

📋 TL;DR

This path traversal vulnerability in Fortinet FortiWeb web application firewalls allows attackers to bypass directory restrictions and potentially execute unauthorized code or commands. It affects organizations running FortiWeb versions 7.0.0 through 7.6.0. Attackers can exploit this by sending specially crafted requests to vulnerable systems.

💻 Affected Systems

Products:
  • Fortinet FortiWeb
Versions: 7.0.0 through 7.6.0
Operating Systems: FortiWeb OS
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments within affected version range are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, or lateral movement within the network.

🟠

Likely Case

Unauthorized file access, configuration modification, or limited command execution depending on system permissions.

🟢

If Mitigated

Attack blocked at perimeter with proper input validation and least privilege configurations in place.

🌐 Internet-Facing: HIGH - FortiWeb devices are typically deployed as perimeter security controls facing the internet.
🏢 Internal Only: MEDIUM - Internal deployments still vulnerable but with reduced attack surface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities typically have low exploitation complexity once the vulnerable endpoint is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.6.1 and later

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-439

Restart Required: Yes

Instructions:

1. Log into FortiWeb management interface. 2. Navigate to System > Dashboard. 3. Check for available firmware updates. 4. Download and install FortiWeb version 7.6.1 or later. 5. Reboot the device after installation completes.

🔧 Temporary Workarounds

Input Validation Rules

all

Implement strict input validation rules to block path traversal patterns in requests.

Configure via FortiWeb GUI: Security > Server Policy > Edit Policy > Input Validation

Access Control Restrictions

all

Restrict access to management interfaces and vulnerable endpoints using network ACLs.

Configure via FortiWeb GUI: System > Network > Interface > Access Control

🧯 If You Can't Patch

  • Isolate vulnerable FortiWeb devices behind additional firewall layers with strict ingress/egress rules.
  • Implement network segmentation to limit potential lateral movement if exploitation occurs.

🔍 How to Verify

Check if Vulnerable:

Check FortiWeb firmware version via GUI: System > Dashboard > Firmware Version, or CLI: get system status

Check Version:

get system status | grep Version

Verify Fix Applied:

Confirm firmware version is 7.6.1 or later and test with known safe path traversal payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • Requests containing '../' sequences
  • Failed authentication attempts followed by path traversal patterns

Network Indicators:

  • Unusual outbound connections from FortiWeb device
  • Traffic patterns indicating file enumeration

SIEM Query:

source="fortiweb" AND ("../" OR "..\\" OR "%2e%2e%2f")

🔗 References

📤 Share & Export