top of page

Subscribe to our newsletter

Mitigating CVE-2024-23113: Fortinet's FortiOS Vulnerability and Exploitation Analysis

CVE Image for report on CVE-2024-23113

Executive Summary

In the rapidly evolving landscape of cybersecurity threats, the recent discovery of a critical remote code execution (RCE) vulnerability in Fortinet's FortiOS, identified as CVE-2024-23113, has raised significant concerns. This vulnerability is actively being exploited in the wild, posing substantial risks to organizations utilizing affected Fortinet products. The sectors and countries targeted by Advanced Persistent Threat (APT) groups exploiting this vulnerability include critical infrastructure sectors in the United States and Europe. This report aims to provide Rescana's customers with a comprehensive understanding of the vulnerability, its exploitation, and recommended mitigation strategies to safeguard their network infrastructure.

Technical Information

The vulnerability, CVE-2024-23113, affects several Fortinet products, including FortiOS 7.0 and later, FortiPAM 1.0 and higher, FortiProxy 7.0 and above, and FortiWeb 7.4. The flaw is attributed to the fgfmd daemon, which erroneously accepts an externally controlled format string as an argument. This vulnerability allows unauthenticated threat actors to execute commands or arbitrary code on unpatched devices through low-complexity attacks that do not require user interaction. The technical impact of this vulnerability is severe, as successful exploitation can lead to unauthorized command execution, potentially compromising the entire network infrastructure. The vulnerability has been added to the Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities Catalog, highlighting its critical nature.

Exploitation in the Wild

The active exploitation of CVE-2024-23113 has been confirmed by CISA, with reports indicating that threat actors are leveraging this vulnerability to gain unauthorized access to vulnerable systems. The Dutch Military Intelligence and Security Service (MIVD) previously reported that Chinese hackers exploited a similar FortiOS RCE vulnerability, CVE-2022-42475, to breach and infect Fortigate network security appliances. Indicators of Compromise (IOCs) associated with this exploitation include unusual network traffic patterns, unauthorized access attempts, and the presence of malicious scripts or executables on affected systems.

APT Groups using this vulnerability

The exploitation of CVE-2024-23113 has been linked to several APT groups, including those with ties to nation-state actors. These groups have been known to target critical infrastructure sectors in the United States and Europe, aiming to disrupt operations and exfiltrate sensitive data. The involvement of such sophisticated threat actors underscores the importance of addressing this vulnerability promptly to mitigate potential risks.

Affected Product Versions

The products affected by CVE-2024-23113 include FortiOS 7.0 and later, FortiPAM 1.0 and higher, FortiProxy 7.0 and above, and FortiWeb 7.4. Organizations using these versions are at risk and should take immediate action to secure their systems.

Workaround and Mitigation

To mitigate the risks associated with CVE-2024-23113, Fortinet has advised removing access to the fgfmd daemon for all interfaces. This measure will prevent FortiGate discovery from FortiManager, although connections from FortiGate will still be possible. Additionally, implementing a local-in policy that restricts FGFM connections to specific IP addresses can reduce the attack surface. It is crucial to note that this is a mitigation, not a complete workaround. Organizations are strongly urged to apply the latest security patches provided by Fortinet to address this vulnerability effectively.

References

For further information, please refer to the following resources: Bleeping Computer Article: CISA says critical Fortinet RCE flaw now exploited in attacks (https://www.bleepingcomputer.com/news/security/cisa-says-critical-fortinet-rce-flaw-now-exploited-in-attacks/), CISA Known Exploited Vulnerabilities Catalog, and Fortinet Security Advisory (February 2024).

Rescana is here for you

At Rescana, we understand the challenges posed by emerging cybersecurity threats and are committed to helping our customers navigate these complexities. Our Continuous Threat and Exposure Management (CTEM) platform is designed to provide comprehensive insights into vulnerabilities and assist in implementing effective mitigation strategies. We are here to support you in safeguarding your network infrastructure. For further assistance or inquiries, please contact our cybersecurity team at ops@rescana.com.

bottom of page