Fortinet, a maker of network security software, has kept a critical vulnerability under wraps for more than a week amid reports that attackers are using it to execute malicious code on servers used by sensitive customer organizations.
Fortinet representatives didn’t respond to emailed questions and have yet to release any sort of public advisory detailing the vulnerability or the specific software that’s affected. The lack of transparency is consistent with previous zero-days that have been exploited against Fortinet customers. With no authoritative source for information, customers, reporters, and others have few other avenues for information other than social media posts where the attacks are being discussed.
RCE stands for remote code execution
According to one Reddit post, the vulnerability affects FortiManager, a software tool for managing all traffic and devices on an organization’s network. Specific versions vulnerable, the post said, include FortiManager versions:
- 7.6.0 and below
- 7.4.4 and below
- 7.2.7 and below
- 7.0.12 and below
- 6.4.14 and below
Users of these versions can protect themselves by installing versions 7.6.1 or above, 7.4.5 or above, 7.2.8 or above, 7.0.13 or above, or 6.4.15 or above. There are reports that the cloud-based FortiManager Cloud is vulnerable as well.
Some administrators of FortiGate-powered networks report receiving emails from the company notifying them of the available updates and advice to install them. Others say they received no such emails. Fortigate hasn’t published any sort of public advisory or a CVE designation for security practitioners to track the zero-day.
The vulnerability has been discussed since at least October 13. According to independent researcher Kevin Beaumont, the security bug stems from a default FortiManager setting that allows devices with unknown or unauthorized serial numbers to register themselves into an organization’s FortiManager dashboard. Precise details still aren’t clear, but a now-deleted comment on Reddit indicated that the zero-day allows attackers to “steal a Fortigate certificate from any Fortigate, register to your FortiManager and gain access to it.”
I assume that some of it is just sloppy; but there are presumably also people specifically using fortimanager to deal with a whole fleet of teeny little branch office or remote work type firewalls(something like the fortigate 30G) that may not even be coming from static IPs; but which need their configs kept in sync and managed as needed.
The fact that the vulnerability apparently involves being able to use random fortigate certs to enroll devices into fortimanager suggests that fortinet might have inadvertently leaned a little too hard into the desire to facilitate EZ-provisioning use cases(rather than default deny with either requiring your own certs loaded for more paranoid environments; or at least blessing clients by serial number with the SN included in the vendor loaded cert for setups where they don't want IT to have to touch every teeny branch firewall before it gets shipped to location.
Sure; if you are using fortimanager to keep a handful of bigger firewalls on a relatively well defined corporate network in sync you've screwed up if the thing is internet accessible; but the relatively tiny devices they also sell suggest that wide-area remote management is also an intended use case.
When the VPN tunnel goes down at a site, you can still manage it through FortiManager and you have a way to push scripts to the device to bounce the VPN tunnel, update certs, etc.