MitM attack in FortiOS



Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2024-26013
CVE-2024-50565
CWE-ID CWE-923
Exploitation vector Network
Public exploit N/A
Vulnerable software
FortiOS
Operating systems & Components / Operating system

Vendor Fortinet, Inc

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Improper restriction of communication channel to intended endpoints

EUVDB-ID: #VU107249

Risk: High

CVSSv4.0: 4.5 [CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-26013

CWE-ID: CWE-923 - Improper Restriction of Communication Channel to Intended Endpoints

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to missing certificate name verification for FGFM connection. A remote non-authenticated attacker can intercept the FGFM authentication request between the management device and the managed device and impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager).

Successful exploitation of the vulnerability may allow an attacker to compromise the affected device.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

FortiOS: 6.2.0 - 7.4.4

CPE2.3 External links

https://fortiguard.fortinet.com/psirt/FG-IR-24-046


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper restriction of communication channel to intended endpoints

EUVDB-ID: #VU107250

Risk: High

CVSSv4.0: 4.5 [CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-50565

CWE-ID: CWE-923 - Improper Restriction of Communication Channel to Intended Endpoints

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to missing certificate name verification for FGFM connection. A remote non-authenticated attacker can intercept the FGFM authentication request between the management device and the managed device and impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager).

Successful exploitation of the vulnerability may allow an attacker to compromise the affected device.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

FortiOS: 6.2.0 - 7.4.4

CPE2.3
External links

https://fortiguard.fortinet.com/psirt/FG-IR-24-046


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###