Exploit
CVE-2024-47575

Missing Authentication for Critical Function (CWE-306)

Published: Oct 23, 2024 / Updated: 27d ago

010
CVSS 9.8EPSS 1.22%Critical
CVE info copied to clipboard

Summary

A missing authentication for critical function in FortiManager and FortiManager Cloud allows an attacker to execute arbitrary code or commands via specially crafted requests. This vulnerability affects multiple versions of FortiManager (versions 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.7, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, and 6.2.0 through 6.2.12) and FortiManager Cloud (versions 7.4.1 through 7.4.4, 7.2.1 through 7.2.7, 7.0.1 through 7.0.13, and 6.4.1 through 6.4.7). The vulnerability is classified as CWE-306: Missing Authentication for Critical Function.

Impact

This vulnerability has a critical severity with a CVSS v3.1 base score of 9.8 out of 10. The impact is severe across all three primary security objectives: confidentiality, integrity, and availability, all rated as HIGH impact. An attacker can exploit this vulnerability remotely over the network without requiring any privileges or user interaction, and the attack complexity is low. Potential impacts include: 1. Unauthorized access to critical functions 2. Execution of arbitrary code or commands on affected systems 3. Complete compromise of system confidentiality, integrity, and availability 4. Potential for lateral movement within the network 5. Data theft, manipulation, or destruction 6. Service disruptions or system takeover The vulnerability is actively being exploited in the wild and has been added to the CISA Known Exploited Vulnerability list, indicating a high risk of exploitation.

Exploitation

One proof-of-concept exploit is available on fortinet.com. The vulnerability is actively being exploited in the wild and was added to the CISA Known Exploited Vulnerability list. Its exploitation has been reported by various sources, including bleepingcomputer.com.

Patch

As of the vulnerability publication date (2024-10-23), there is no specific mention of a patch being available. However, given the critical nature of the vulnerability, it is highly recommended to check for and apply any security updates or patches released by Fortinet as soon as they become available.

Mitigation

While waiting for an official patch, consider the following mitigation strategies: 1. Network Segmentation: Isolate FortiManager and FortiManager Cloud instances from untrusted networks. 2. Access Control: Implement strict access controls and firewall rules to limit connectivity to FortiManager systems only to trusted IP addresses and networks. 3. Monitoring: Enhance monitoring for unusual activities or unauthorized access attempts on FortiManager systems. 4. Least Privilege: Ensure all user accounts and services are operating with the least privilege necessary. 5. Regular Audits: Conduct regular security audits and vulnerability assessments. 6. Update Plan: Prepare an update plan to quickly deploy patches once they are released by Fortinet. 7. Backup: Ensure critical data and configurations are backed up regularly. 8. Incident Response: Review and update incident response plans to address potential exploitation of this vulnerability. It is crucial to prioritize addressing this vulnerability due to its critical severity and the potential for significant impact on affected systems.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (44450)

Oct 23, 2024 at 7:53 AM
CVE Assignment

NVD published the first details for CVE-2024-47575

Oct 23, 2024 at 3:15 PM
CVSS

A CVSS base score of 9.8 has been assigned.

Oct 23, 2024 at 3:20 PM / nvd
First Article

Feedly found the first article mentioning CVE-2024-47575. See article

Oct 23, 2024 at 3:21 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Oct 23, 2024 at 3:21 PM
Exploitation in the Wild

Attacks in the wild have been reported by Cybersecurity. See article

Oct 23, 2024 at 3:24 PM / Cybersecurity
Threat Intelligence Report

CVE-2024-47575 is a critical vulnerability with a CVSSv3 score of 9.8, allowing attackers to execute unauthorized code or commands. The details regarding exploitation in the wild, proof-of-concept exploits, mitigations, detections, patches, or downstream impacts on third-party vendors are not provided in the available information. See article

Oct 23, 2024 at 3:36 PM
Exploitation in the Wild

Attacks in the wild have been reported by CISA Known Exploited Vulnerability.

Oct 23, 2024 at 5:45 PM / CISA Known Exploited Vulnerability
Trending

This CVE started to trend in security discussions

Oct 23, 2024 at 6:24 PM
Static CVE Timeline Graph

Affected Systems

Fortinet/fortimanager_cloud
+null more

Exploits

https://fortiguard.fortinet.com/psirt/FG-IR-24-423
+null more

Proof Of Exploit

https://www.cisa.gov/known-exploited-vulnerabilities-catalog
+null more

Patches

fortiguard.fortinet.com
+null more

Links to Threat Actors

UNC5820
+null more

Attack Patterns

CAPEC-12: Choosing Message Identifier
+null more

References

Missing authentication in fgfmsd
The identified actions of this attack in the wild have been to automate via a script the exfiltration of various files from the FortiManager which contained the IPs, credentials and configurations of the managed devices. type=event,subtype=dvm,pri=notice,desc="Device,Manager,dvm,log,at,notice,level",user="System",userfrom="",msg="" adom="root" session_id=0 operation="Modify device" performed_on="localhost" changes="Edited device settings (SN FMG-VMTM23017412)"
Fortinet FortiManager 未授权RCE(CVE-2024-47575)
Our regular readers may recognize the acronym from our [previous post](https://labs.watchtowr.com/fortinet-fortigate-cve-2024-23113-a-super-complex-vulnerability-in-a-super-secure-appliance-in-2024/), in which we exploit a format string vulnerability in the FortiGate appliance side of FGFM and it’s usage. One thing that makes our lives easier is that Fortinet consistently prioritises (like other appliance manufacturers) debugging capabilities over code security (actually, it’s our opinion that they prioritise a lot over code security, but regardless) making our lives signifcantly easier when trying to work out what’s going on.
Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager CVE-2024-47575
As we stated before, FortiJump is a vulnerability not in Fortigate devices, such as their firewalls and other appliances, but in FortiManager, a tool used by device administrators to maintain entire fleets of appliances. One thing that makes our lives easier is that Fortinet consistently prioritises (like other appliance manufacturers) debugging capabilities over code security (actually, it’s our opinion that they prioritise a lot over code security, but regardless) making our lives signifcantly easier when trying to work out what’s going on.
See 49 more references

News

CISA: CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation, as confirmed by Fortinet. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats.
CISA: Fortinet Updates Guidance and Indicators of Compromise following FortiManager Vulnerability Exploitation
Fortinet Updates Guidance and Indicators of Compromise following FortiManager Vulnerability Exploitation Fortinet has updated their security advisory addressing a critical FortiManager vulnerability (CVE-2024-47575) to include additional workarounds and indicators of compromise (IOCs).
About the Remote Code Execution – FortiManager “FortiJump” (CVE-2024-47575) vulnerability
About the Remote Code Execution – FortiManager “FortiJump” (CVE-2024-47575) vulnerability. FortiManager is a centralized solution for configuring, enforcing policies, updating, and monitoring Fortinet network devices. The vulnerability was released on October 23 . A missing authentication for critical function in the FortiManager fgfmd (FortiGate-to-FortiManager) daemon allows remote attacker to execute arbitrary code or commands via specially crafted requests. There were signs of exploitation in the wild and the vulnerability was added to the CISA KEV . On November 15 , WatchTowr Labs published a post about this “FortiJump” vulnerability with a video demo and a link to the PoC. The researchers noted that the IOC in the Fortinet bulletin can be bypassed. And the patch itself is incomplete. On a patched device, it is possible to escalate privileges by exploiting a vulnerability called “FortiJump Higher”. На русском
FortiManager Zero-Day ‘FortiJump’ Is Now Publicly Addressed (CVE-2024-47575)
submitted by /u/jnazario to r/blueteamsec [link] [comments]
Fortinet VPN zero-day exploited by Chinese threat actor
The flaw, which isn't yet assigned a CVE designation, has been leveraged by the group’s DeepData post-exploitation tool to extract usernames, passwords, and VPN server details directly from memory after user authentication, providing initial access to corporate networks for espionage. Earlier in October 2024, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned that threat actors were actively exploiting a critical vulnerability in several Fortinet devices, which was previously disclosed and patched in February 2024.
See 436 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI