MitM attack in FortiManager



Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2024-26013
CVE-2024-50565
CWE-ID CWE-923
Exploitation vector Network
Public exploit N/A
Vulnerable software
FortiManager
Server applications / IDS/IPS systems, Firewalls and proxy servers

Vendor Fortinet, Inc

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Improper restriction of communication channel to intended endpoints

EUVDB-ID: #VU107249

Risk: High

CVSSv4.0: 4.5 [CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-26013

CWE-ID: CWE-923 - Improper Restriction of Communication Channel to Intended Endpoints

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to missing certificate name verification for FGFM connection. A remote non-authenticated attacker can intercept the FGFM authentication request between the management device and the managed device and impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager).

Successful exploitation of the vulnerability may allow an attacker to compromise the affected device.

Mitigation

Install update from vendor's website.

Vulnerable software versions

FortiManager: 6.2.0 - 7.4.2

CPE2.3 External links

https://www.fortiguard.com/psirt/FG-IR-24-046


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper restriction of communication channel to intended endpoints

EUVDB-ID: #VU107250

Risk: High

CVSSv4.0: 4.5 [CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2024-50565

CWE-ID: CWE-923 - Improper Restriction of Communication Channel to Intended Endpoints

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to missing certificate name verification for FGFM connection. A remote non-authenticated attacker can intercept the FGFM authentication request between the management device and the managed device and impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager).

Successful exploitation of the vulnerability may allow an attacker to compromise the affected device.

Mitigation

Install update from vendor's website.

Vulnerable software versions

FortiManager: 6.2.0 - 7.4.2

CPE2.3 External links

https://www.fortiguard.com/psirt/FG-IR-24-046


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###