{"id":19545,"date":"2024-02-09T14:15:22","date_gmt":"2024-02-09T14:15:22","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=19545"},"modified":"2024-02-09T14:15:22","modified_gmt":"2024-02-09T14:15:22","slug":"new-fortinet-vpn-rce-flaw","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/new-fortinet-vpn-rce-flaw\/","title":{"rendered":"New Fortinet VPN RCE Flaw Discovered, Patch ASAP"},"content":{"rendered":"<p>Fortinet has issued a warning about a recently discovered critical vulnerability in its FortiOS SSL VPN system that could be actively exploited by attackers. The vulnerability in Fortinet network security solutions poses a <strong>significant threat to organizations<\/strong>. It allows unauthenticated attackers to gain remote code execution (RCE) capabilities through maliciously crafted requests.<\/p>\n<h2>Fortinet VPN RCE Vulnerability Uncovered<\/h2>\n<p>This flaw, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21762\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">identified as CVE-2024-21762<\/a> \/ FG-IR-24-015, poses a severe risk with a CVSS rating of 9.6 due to its potential exploitation in cyber-attacks. Also, the heart of this alert is an out-of-bounds write vulnerability within the FortiOS system. Such a flaw allows unauthenticated attackers to <strong>execute remote code<\/strong> through maliciously crafted requests.<\/p>\n<figure id=\"attachment_19563\" aria-describedby=\"caption-attachment-19563\" style=\"width: 790px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/rce_vulnerability.png\" alt=\"RCE flaws\" width=\"790\" height=\"364\" class=\"size-full wp-image-19563\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/rce_vulnerability.png 790w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/rce_vulnerability-300x138.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/rce_vulnerability-768x354.png 768w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><figcaption id=\"caption-attachment-19563\" class=\"wp-caption-text\">General chain of RCE flaw exploitation<\/figcaption><\/figure>\n<p>The amount of fuzz around <a href=\"https:\/\/gridinsoft.com\/vulnerability\">this new vulnerability<\/a> caused by the popularity of Fortinet networking solutions, along with the severity of the said vulnerability. Aside from the aspects mentioned above, RCE flaws can <strong>lead to system compromise and data theft<\/strong>. In some cases, they can also initiate ransomware or espionage attacks. In simple terms, it can simply be the reason for a company-wide cyberattack, with downtimes, leaked data and all the related \u201cdelights\u201d.<\/p>\n<p>This critical flaw was disclosed <strong>alongside other vulnerabilities<\/strong>, including CVE-2024-23113, which boasts an even higher severity rating of 9.8, and two medium-severity flaws, CVE-2023-44487 and CVE-2023-47537. However, these additional vulnerabilities are not currently marked as being actively exploited in the wild, unlike CVE-2024-21762.<\/p>\n<h2>Hackers Exploit Fortinet RCE Flaw<\/h2>\n<p>The disclosure of this vulnerability comes after it was revealed that <strong>Chinese state-sponsored threats<\/strong> known as Volt Typhoon have <a href=\"https:\/\/gridinsoft.com\/blogs\/fortinet-fixes-rce-flaw\/\">already exploited FortiOS<\/a> vulnerabilities in the past. The deployment of custom malware such as Coathanger, a remote access trojan (RAT), suggests that adversaries are <strong>willing to do anything<\/strong> to exploit such vulnerabilities. This malware, in particular, has been used in attacks against the Dutch Ministry of Defense. This highlights the critical nature of the threats posed by such malware.<\/p>\n<p>Still, as statistics show, the majority of exploitation cases happen after the vulnerability is publicly disclosed. Therehence, the best option will be to <strong>patch the flaw as soon as possible<\/strong>. Fortunately, the developer already offers the fixes for CVE-2024-21762.<\/p>\n<h2>Patch and Mitigation<\/h2>\n<p><a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-24-015\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">The patch released by Fortinet<\/a> brings affected FortiOS systems up-to-date, addressing the vulnerability and <strong>preventing potential exploitation<\/strong> by attackers. Fortinet recommends upgrading based on the following table:<\/p>\n<div class=\"su-table su-table-alternate\">\n<table>\n<tr style=\"text-align:center\">\n<td><strong>Version<\/strong><\/td>\n<td><strong>Affected<\/strong><\/td>\n<td><strong>Solution<\/strong><\/td>\n<\/tr>\n<tr>\n<td>FortiOS 7.6<\/td>\n<td>Not affected<\/td>\n<td>Not Applicable<\/td>\n<\/tr>\n<tr>\n<td>FortiOS 7.4<\/td>\n<td>7.4.0 through 7.4.2<\/td>\n<td>Upgrade to 7.4.3 or above<\/td>\n<\/tr>\n<tr>\n<td>FortiOS 7.2<\/td>\n<td>7.2.0 through 7.2.6<\/td>\n<td>Upgrade to 7.2.7 or above<\/td>\n<\/tr>\n<tr>\n<td>FortiOS 7.0<\/td>\n<td>7.0.0 through 7.0.13<\/td>\n<td>Upgrade to 7.0.14 or above<\/td>\n<\/tr>\n<tr>\n<td>FortiOS 6.4<\/td>\n<td>6.4.0 through 6.4.14<\/td>\n<td>Upgrade to 6.4.15 or above<\/td>\n<\/tr>\n<tr>\n<td>FortiOS 6.2<\/td>\n<td>6.2.0 through 6.2.15<\/td>\n<td>Upgrade to 6.2.16 or above<\/td>\n<\/tr>\n<tr>\n<td>FortiOS 6.0<\/td>\n<td>6.0 all versions<\/td>\n<td>Migrate to a fixed release<\/td>\n<\/tr>\n<\/table>\n<\/div>\n<p>The developer has provided guidance for those unable to immediately apply the necessary patches to mitigate this flaw. A possible mitigation strategy is to <strong>disable SSL VPN on affected FortiOS devices<\/strong>. While this step may impact remote access capabilities, it may be necessary to prevent exploitation. It&#8217;s crucial to note that merely disabling web mode is not considered a sufficient workaround for this vulnerability.<\/p>\n<p style=\"padding-top:15px;padding-bottom:15px;\"><a href=\"\/download\/antimalware\" rel=\"nofollow\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/07\/env02.webp\" alt=\"New Fortinet VPN RCE Flaw Discovered, Patch ASAP\" width=\"798\" height=\"336\" class=\"aligncenter size-full\" title=\"\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fortinet has issued a warning about a recently discovered critical vulnerability in its FortiOS SSL VPN system that could be actively exploited by attackers. The vulnerability in Fortinet network security solutions poses a significant threat to organizations. It allows unauthenticated attackers to gain remote code execution (RCE) capabilities through maliciously crafted requests. Fortinet VPN RCE [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":19557,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[619,1060,745,374],"class_list":{"0":"post-19545","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-cybersecurity","9":"tag-fortinet","10":"tag-vpn","11":"tag-vulnerability"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/02\/GS_Blog_banner_New-Fortinet-VPN-RCE-Flaw-Discovered-Patch-ASAP_1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/19545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=19545"}],"version-history":[{"count":12,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/19545\/revisions"}],"predecessor-version":[{"id":19568,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/19545\/revisions\/19568"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/19557"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=19545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=19545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=19545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}