Over 300,000+ Fortinet Firewalls Vulnerable to Critical FortiOS RCE Bug
Despite a most up-to-date security patch change from Fortinet, a lot of FortiGate firewalls are in possibility which capacity that of a critical security flaw tracked as CVE-2023-27997 by the protection researchers at Bishop Fox.
FortiOS, the connecting OS for Fortinet’s Security Fabric, has this vulnerability, and it’s an RCE (A ways-off Code Execution) flaw, and this severe vulnerability completed a rating of 9.8 out of 10.
Round 490,000 SSL VPN interfaces on the accumulate are impacted, with nearly 69% closing unpatched. While this RCE (A ways-off code execution) flaw resulted from a heap-based totally mostly buffer overflow misfortune in FortiOS.
Vulnerability Exploit
The exploitable CVE-2023-27997 enables code execution remotely on vulnerable gadgets with the exposed SSL VPN web interface, and the dealer warned about the probably exploitation within the mid-June advisory.
Sooner than public disclosure, Fortinet resolved the vulnerability on June 11 thru the free up of the next FortiOS firmware versions:
- 6.0.17
- 6.2.15
- 6.4.13
- 7.0.12
- 7.2.5
The exploit for CVE-2023-27997, developed by the Ability Pattern personnel of Bishop Fox, actively checks the prospects of Cosmos. While except for this, the exploit does the next things:-
- Breaks the heap
- Establishes a connection to the attacker’s server
- Downloads BusyBox binary
- Opens an interactive shell
The exploit executes in true one 2nd, surpassing the demo video’s skedaddle on a 64-bit tool. Shodan search engine aided Bishop Fox researchers in detecting gadgets with exposed SSL VPN interfaces.
By making an are trying for house equipment with explicit HTTP response header, they stumbled on gadgets redirecting to ‘/some distance away/login,’ indicating exposed SSL VPN interface.
Out of 489,337 gadgets show within the question, now not all had been at possibility of Xortigate (CVE-2023-27997). Extra investigation printed 153,414 house equipment updated to gain the FortiOS version.
Roughly 335,900 web-accessible FortiGate firewalls are prone to attacks, surpassing the earlier estimate of 250,000 derived from much less legitimate queries.
Vulnerability Profile
- CVE ID: CVE-2023-27997
- Summary: A heap-based totally mostly buffer overflow vulnerability [CWE-122] in FortiOS and FortiProxy SSL-VPN might perhaps allow a much away attacker to support out arbitrary code or instructions by strategy of particularly crafted requests.
- IR Amount: FG-IR-23-097
- Date: Jun 12, 2023
- CVSSv3 Salvage: 9.2
- Severity: Notable
- Influence: Enact unauthorized code or instructions
Bishop Fox researchers stumbled on that a lot of exposed FortiGate gadgets hadn’t got updates for eight years, with some aloof working unsupported FortiOS 6 since its extinguish of toughen on September 29 final yr.
Affected Products
Here below, we now grasp mentioned all of the merchandise which would be affected:-
- FortiOS-6K7K version 7.0.10
- FortiOS-6K7K version 7.0.5
- FortiOS-6K7K version 6.4.12
- FortiOS-6K7K version 6.4.10
- FortiOS-6K7K version 6.4.8
- FortiOS-6K7K version 6.4.6
- FortiOS-6K7K version 6.4.2
- FortiOS-6K7K version 6.2.9 thru 6.2.13
- FortiOS-6K7K version 6.2.6 thru 6.2.7
- FortiOS-6K7K version 6.2.4
- FortiOS-6K7K version 6.0.12 thru 6.0.16
- FortiOS-6K7K version 6.0.10
- FortiProxy version 7.2.0 thru 7.2.3
- FortiProxy version 7.0.0 thru 7.0.9
- FortiProxy version 2.0.0 thru 2.0.12
- FortiProxy 1.2 all versions
- FortiProxy 1.1 all versions
- FortiOS version 7.2.0 thru 7.2.4
- FortiOS version 7.0.0 thru 7.0.11
- FortiOS version 6.4.0 thru 6.4.12
- FortiOS version 6.2.0 thru 6.2.13
- FortiOS version 6.0.0 thru 6.0.16
Solutions
Here below we now grasp mentioned all of the solutions:-
- Please upgrade to FortiOS-6K7K version 7.0.12 or above
- Please upgrade to FortiOS-6K7K version 6.4.13 or above
- Please upgrade to FortiOS-6K7K version 6.2.15 or above
- Please upgrade to FortiOS-6K7K version 6.0.17 or above
- Please upgrade to FortiProxy version 7.2.4 or above
- Please upgrade to FortiProxy version 7.0.10 or above
- Please upgrade to FortiProxy version 2.0.13 or above
- Please upgrade to FortiOS version 7.4.0 or above
- Please upgrade to FortiOS version 7.2.5 or above
- Please upgrade to FortiOS version 7.0.12 or above
- Please upgrade to FortiOS version 6.4.13 or above
- Please upgrade to FortiOS version 6.2.14 or above
- Please upgrade to FortiOS version 6.0.17 or above
Proof-of-belief exploit code for serious-severity flaws is publicly readily available within the market, rendering these gadgets vulnerable. For the time being, the workaround readily available within the market is “Disable SSL-VPN.”
Smartly timed patching serious vulnerabilities is strongly urged to safeguard treasured sources, in particular these prone to confirmed exploitation.
Source credit : cybersecuritynews.com