No recent events yet!
Risk: | high |
Damage: |
high |
Platform(s): |
Fortinet OS Fortinet Products |
Advisory ID: |
ngCERT-2024-0023 |
Version: |
N/A |
CVE: |
CVE-2024-21762 |
Published: |
July 11, 2024 |
ngCERT is aware of a critical security flaw in several versions of Fortinet Operating System (FortiOS). The vulnerability dubbed (CVE-2024-21762) with a CVSS score of 9.6, is an out-of-bounds write vulnerability that may allow a remote unauthenticated attacker to execute arbitrary code or command on Fortinet SSL VPNs via specially crafted HTTP requests. It is pertinent to note that other recent Fortinet SSL VPN vulnerabilities identified as (CVE-2022-42475, CVE-2022-41328, and CVE-2023-27997) have been exploited by cybercriminals as both zero-day and n-day following public disclosure. Consequently, ngCERT advises individuals and organizations to take immediate steps to protect their systems from exploitation by threat actors.
CVE-2024-21762 is an out-of-bounds write vulnerability discovered in Fortinet’s FortiOS/FortiProxy. The flaw resides in the SSL VPN functionality, allowing remote attackers to execute arbitrary code without authentication. Threat actors exploit this flaw by initially sending crafted HTTP requests to vulnerable devices to trigger a buffer overflow condition, potentially leading to remote code execution. The attacker can further carry out other malicious activities. FortiOS versions vulnerable to CVE-2024-21762 include FortiOS 7.4.0 through 7.4.2, down to all versions of FortiOS 6.0, while FortiProxy 7.4.0 through 7.4.2, down to all versions of FortiProxy 1.0 are affected.
Successful exploitation of the vulnerabilities could lead to:
a. Theft of sensitive data.
b. Privilege escalation.
c. Compromising the internal network.
d. Setting up a backdoor.
e. Denial of service (DoS).
f. Ransomware attacks.
The following are recommended:
a. Disable the SSL VPN functionality until the vulnerability is patched.
b. Upgrade FortiOS and FortiProxy to the latest versions provided by Fortinet, following the upgrade path tool via the link https://docs.fortinet.com/upgrade-tool.
c. Implement network segmentation, access controls, and intrusion detection systems to limit the exposure and impact of potential attacks.
d. Conduct regular security audits and system updates to ensure compliance and security.