Vulnerability identifier: #VU99287
Vulnerability risk: Critical
CVSSv3.1: 9.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-306
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
FortiManager
Server applications /
IDS/IPS systems, Firewalls and proxy servers
Vendor: Fortinet, Inc
Description
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to missing authentication in FortiManager fgfmd daemon. A remote non-authenticated attacker can send specially crafted requests to the system and execute arbitrary commands, resulting in full system compromise.
Note, the vulnerability is being actively exploited in the wild.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
FortiManager: 7.4.0 - 7.4.4, 7.2.0 - 7.2.7, 7.6.0, 7.0.0 - 7.0.12, 6.4.0 - 6.4.14, 6.2.0 - 6.2.12
External links
http://www.fortiguard.com/psirt/FG-IR-24-423
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.