#VU97117 Improper certificate validation in Fortinet, Inc products - CVE-2024-31489


Vulnerability identifier: #VU97117

Vulnerability risk: Medium

CVSSv4.0: 5.8 [CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-31489

CWE-ID: CWE-295

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Fortinet FortiClient for Windows
Server applications / Other server solutions
FortiClient (macOS)
Client/Desktop applications / Software for system administration
FortiClient (Linux)
Client/Desktop applications / Software for system administration

Vendor: Fortinet, Inc

Description

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to improper validation of client-side certificate in ZTA service. A remote attacker can perform Man-in-the-Middle attack on the communication channel between the FortiGate and the FortiClient during the ZTNA tunnel creation.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Fortinet FortiClient for Windows: 7.0.0 - 7.0.11, 7.2.0 - 7.2.2

FortiClient (macOS): 7.0.0 - 7.2.4

FortiClient (Linux): 7.0.0 - 7.2.0


External links
https://www.fortiguard.com/psirt/FG-IR-22-282


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability