Fortinet FortiOS Vulnerabilities Allow Unauthorized Code Execution
CVE-2024-21762

9.8CRITICAL

Key Information:

Vendor
Fortinet
Vendor
CVE Published:
9 February 2024

Badges

🥇 Trended No. 1📈 Trended📈 Score: 27,800💰 Ransomware👾 Exploit Exists🟡 Public PoC🦅 CISA Reported📰 News Worthy

What is CVE-2024-21762?

CVE-2024-21762 is a critical vulnerability found in Fortinet’s FortiOS and FortiProxy software, which are essential for network security operations. This flaw allows attackers to execute unauthorized code or commands by sending specifically crafted requests to affected systems. If exploited, this vulnerability can severely undermine an organization’s security posture, leading to possible disruption of services, data loss, and unauthorized access to sensitive information. Fortinet products are widely used in enterprise environments, making the implications of this vulnerability particularly concerning.

Technical Details

The vulnerability is a result of an out-of-bounds write that affects several versions of FortiOS, specifically versions ranging from 6.0.0 to 7.4.2, and multiple versions of FortiProxy from 1.0.0 to 7.4.2. This flaw allows for the manipulation of memory locations, enabling attackers to inject and execute arbitrary code. Because this code execution can occur remotely, it increases the risk of widespread exploitation across multiple environments without the need for physical access to the affected systems.

Impact of the Vulnerability

  1. Unauthorized Code Execution: The primary risk is that attackers can execute arbitrary code on vulnerable Fortinet devices, potentially gaining full control over the network, allowing them to deploy malware or compromise other connected systems.

  2. Data Breach Risks: By exploiting this vulnerability, attackers may access and exfiltrate sensitive data, leading to significant confidentiality breaches and potential regulatory consequences for affected organizations.

  3. Service Disruption: The execution of unauthorized commands could result in service outages or interruptions, impacting business operations and undermining trust with clients and stakeholders.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.

The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

FortiOS 7.4.0 <= 7.4.2

FortiOS 7.2.0 <= 7.2.6

FortiOS 7.0.0 <= 7.0.13

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVE-2024-21762 Exploit Sale Targets FortiOS SSL VPN

The CVE-2024-21762 exploit sale on the dark web targets Fortinet's FortiOS and FortiProxy systems with a potential remote code execution.

11 months ago

Over 133,000 Fortinet appliances are still vulnerable to a critical flaw — here’s why you need to patch now

Tens of thousands of Fortinet customers are still yet to patch vulnerable appliances

11 months ago

133,000+ Vulnerable FortiOS/FortiProxy Instances : Exploitation Started

A critical security vulnerability has identified in Fortinet's FortiOS and FortiProxy, potentially affecting over 133,000 devices worldwide.

11 months ago

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 🥇

    Vulnerability reached the number 1 worldwide trending spot

  • 📈

    Vulnerability started trending

  • 💰

    Used in Ransomware

  • 👾

    Exploit known to exist

  • 🦅

    CISA Reported

  • Vulnerability published

  • 📰

    First article discovered by securityonline.info

  • Vulnerability Reserved

.