The Register: Warning! FortiManager critical vulnerability under active attack

Source URL: https://www.theregister.com/2024/10/23/fortimanager_critical_vulnerability/
Source: The Register
Title: Warning! FortiManager critical vulnerability under active attack

Feedly Summary: Security shop and CISA urge rapid action
Fortinet has gone public with news of a critical flaw in its software management platform.…

AI Summary and Description: Yes

Summary: The text discusses a critical security vulnerability in Fortinet’s FortiManager control software, identified as CVE-2024-47575, with a CVSS score of 9.8. The vulnerability allows remote attackers to execute arbitrary code on unpatched systems, posing significant risks for users, particularly in the context of exploitations that have been reported in the wild. This situation highlights the need for prompt software updates and transparent communication from security vendors, especially in a landscape where federal agencies are alerted to such vulnerabilities.

Detailed Description:

– **Critical Vulnerability Details**: The vulnerability, CVE-2024-47575, is described as a missing authentication for critical function vulnerability (CWE-306) in the FortiManager fgfmd daemon. It allows remote unauthenticated attackers to execute arbitrary code or commands through specially crafted requests.

– **Impact and Severity**:
– The CVSS score of 9.8 indicates a critical risk, emphasizing the gravity of the flaw.
– Users may be exposed if they utilize FortiManager 7.6 or lower, which are particularly highlighted.

– **Exploitation Risk**:
– CISA (Cybersecurity and Infrastructure Security Agency) confirmed the vulnerability is actively being exploited and included it in its Known Exploited Vulnerabilities Catalog. This alerts federal IT administrators and emphasizes the need for urgent remediations.
– Kevin Beaumont estimated that around 60,000 users may be exposed due to this vulnerability.

– **Authentication Concerns**:
– For an attacker to take advantage of this flaw, they need a valid Fortinet device certificate, which can potentially be extracted from legitimate devices.
– The lack of proper checks allows attackers to log into management software, making systems more vulnerable.

– **Fortinet’s Response**:
– Fortinet has advised users to update their FortiManager software immediately and provided indications of compromise to assist administrators.
– Additionally, the company disclosed malicious IP addresses linked to the attacks and outlined the actions observed during exploitation, such as automated exfiltration of sensitive files from the compromised FortiManager.

– **Broader Context and Compliance Implications**:
– The incident reinforces the importance of timely software updates, transparency, and adherence to security best practices.
– Security vendors must manage disclosures effectively to protect their clients, balancing between stakeholder transparency and potential operational risks.

This situation also serves as a critical reminder for organizations to adopt stringent vulnerability management practices, ensuring that robust incident response and compliance strategies are in place, especially within the realm of infrastructure security.