High Severity Flaw: Vulnerability Rated 9.6 CVSS Score, Enables Remote Execution of Arbitrary Commands via Crafted HTTP Requests
Fortinet urges prompt patching of an N-day vulnerability, possibly exploited in the wild for remote code execution (RCE) attacks. Tracked as CVE-2024-21762, this critical flaw poses a significant risk with a CVSS score of 9.6, enabling remote, unauthenticated actors to execute arbitrary commands via crafted HTTP requests. Although specifics of exploitation remain u**********, a recent Fortinet report underscores the urgency in addressing known vulnerabilities, some exploited in a China-backed espionage campaign.
Read more: GTT Expands Secure Connect Portfolio with Fortinet’s SASE Offering
“The best defense against any N-Day vulnerability is following good cyber hygiene, including remediation guidance and timely patching. The complexity of the exploit suggests an advanced actor, and the fact the attacks are highly targeted at governmental or strategic targets such as critical national infrastructure, manufacturing, and service providers in government-adjacent industries suggests nation-state capability.”
Patching or Workaround Urged Without Delay
Immediate patching or implementation of a workaround is strongly recommended by Fortinet due to the potential exploitation of the “out-of-bounds write” vulnerability in the Secure Socket Layer Virtual Private Network (SSL VPN) service within the Fortinet operating system FortiOS. SSL VPNs serve as trusted secure connections to private organizational networks. Attackers exploit vulnerabilities such as CVE-2024-21762 to infiltrate and compromise systems and networks through these secured channels.
The vulnerability affects FortiOS versions 7.4 (prior to 7.4.2), 7.2 (prior to 7.2.6), 7.0 (prior to 7.0.13), 6.4 (prior to 6.4.14), 6.2 (prior to 6.2.15), and all versions of 6.0. While patches have been released with successive versions of Fortinet, users must note that versions 6.2, 6.4, 7.0, 7.2, and 7.4 have reached the end of support. It’s important to highlight that version 7.6 remains unaffected by this vulnerability.
For users unable to upgrade to patched versions, Fortinet suggests disabling SSL VPN as a temporary workaround. Additionally, Fortinet warns of another critical vulnerability (CVSS 9.8), tracked under CVE-2024-23113, which allows remote code execution (RCE) through the exploitation of an “externally-controlled format string vulnerability” in the FortiOS fgfmd daemon, another authentication module for secure connections.
Read more: Clearwater, 1stResponder Partner to Boost Cyber Incident Response