We would like to bring to your attention a newly discovered authentication bypass vulnerability within FortiOS, FortiProxy and FortiSwitchManager. This vulnerability is currently being actively exploited.
An authentication bypass has been identified using an alternate path or channel vulnerability [CWE-288] in FortiOS, FortiProxy and FortiSwitchManager which allows an unauthenticated attacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests. The vulnerability has been issued the identifier CVE-2022-40684 and has been given a CVSS score of 9.6.
Affected Products
-
FortiOS version 7.2.0 through 7.2.1
-
FortiOS version 7.0.0 through 7.0.6
-
FortiProxy version 7.2.0
-
FortiProxy version 7.0.0
-
FortiSwitchManager version 7.2.0
-
FortiSwitchManager version 7.0.0
Detection
The current version of FortiOS / FortiGate can be checked with the following command, and should be checked against the known affected products above:
get system status
Additional Fortinet recommend to check the device’s log for the following strings to help detected compromised devices:
-
user=”Local_Process_Access”
-
user_interface=”Node.js”
-
user_interface=”Report Runner”
Exploited hosts may show records for these strings.
Remediation
Whilst a workaround has been provided, current best guidance for remediating this issue to update to an unaffected version.
-
FortiOS should be updated to version 7.2.2 or above and version 7.0.7 or above.
-
FortiProxy should be updated to version 7.2.1 or above and version 7.0.7 or above.
-
FortiSwitchManager should be updated to version 7.2.1 or above.
References
What Is Constant Cyber Attack?
CovertSwarm COO Luke Potter explains why traditional testing no longer reflects how real attackers operate. In this piece, he defines constant cyber attack, a discipline built…
Threat Actors Don’t Wait For Your Annual OT Pen test
Annual OT pen tests provide snapshots. Real attackers operate continuously. This is why your operational technology security strategy needs to evolve.
Humans In The Loop: The Non-Negotiable In Offensive Security
AI and automation have transformed offensive security, but not replaced human ingenuity. Luke Potter explains why real attackers, and real defenders, still need humans in the…