Fortinet Addresses Multiple Vulnerabilities in FortiSandbox, FortiOS, & Other Products

Fortinet has released a comprehensive security update addressing numerous vulnerabilities across its product portfolio, with particularly significant issues identified in FortiSandbox, FortiOS, and several other enterprise security solutions. 

These vulnerabilities range from medium to high severity and could potentially allow attackers to execute unauthorized commands, access sensitive information, or bypass security controls in affected deployments. 

The patches come as part of Fortinet’s ongoing security maintenance coordinated through their Product Security Incident Response Team (PSIRT).

FortiSandbox Vulnerabilities
OS Command vulnerability – CVE-2024-52961

FortiSandbox, Fortinet’s advanced threat detection solution, has been found to contain several concerning security flaws. 

Among the most severe is CVE-2024-52961, a high-severity OS command injection vulnerability affecting FortiSandbox versions 5.0.0 through 4.4.3. 

This improper neutralization of special elements used in OS commands (CWE-78) could allow attackers to execute arbitrary commands through the virtual machine download feature. 

The vulnerability represents a significant security risk as it could potentially lead to unauthorized system access or control.

Risk FactorsDetails
Affected ProductsFortiSandbox 5.0.0, 4.4.0-4.4.6, 4.2.0-4.2.7, 4.0.0-4.0.5, and all 3.x versions
ImpactExecution of unauthorized commands
Exploit PrerequisitesAuthentication with at least read-only permission
CVSS 3.1 ScoreNot specified (High severity)
Incorrect authorization vulnerability – CVE-2024-45328

FortiSandbox suffers from CVE-2024-45328, a high-severity incorrect authorization vulnerability (CWE-863) that might allow low-privileged users to gain unauthorized access to administrative functions in the GUI console. This vulnerability affects multiple versions, including 4.4.6 through 4.2.0. 

Risk FactorsDetails
Affected ProductsFortiSandbox 4.4.6, 4.4.5, 4.4.4, 4.4.3, 4.4.2 and earlier
ImpactExecution of elevated CLI commands
Exploit PrerequisitesLow-privileged administrator access
CVSS 3.1 ScoreNot specified (High severity)

Another notable issue, CVE-2024-54027, involves the use of hardcoded cryptographic keys (CWE-321) for remote backup server password encryption, potentially compromising the confidentiality of backup data.

Format String and SQL Injection Vulnerabilities Across Products
Format String Vulnerability – CVE-2024-45324

A particularly widespread vulnerability is CVE-2024-45324, a high-severity format string vulnerability (CWE-134) affecting multiple product lines including FortiOS, FortiProxy, FortiPAM, FortiSRA, and FortiWeb. 

This vulnerability could allow attackers to potentially crash applications or execute code by manipulating externally-controlled format strings. The affected versions span across numerous release branches, including FortiOS 7.4.4 through 7.0.0 and FortiWeb 7.6.0 through 6.3.0.

Risk FactorsDetails
Affected ProductsFortiOS 7.4.4-7.4.0 and earlier, FortiProxy 7.6.0, 7.4.6-7.4.3 and earlier, FortiPAM 1.4.2-1.3.0, FortiSRA 1.4.2-1.4.0, FortiWeb 7.6.0, 7.4.5-7.4.2 and earlier
Impactunauthorized code or commands
Exploit PrerequisitesPrivileged access, crafted HTTP/HTTPS commands
CVSS 3.1 ScoreHigh severity
SQL injection vulnerability – CVE-2024-33501 and CVE-2024-54026

Several SQL injection vulnerabilities have also been identified. CVE-2024-33501 presents a medium-severity authenticated SQL injection vulnerability in the command-line interface of FortiAnalyzer and FortiManager products. 

Risk FactorsDetails
Affected ProductsFortiAnalyzer 7.4.0-7.4.2 and before 7.2.5, FortiManager 7.4.0-7.4.2 and before 7.2.5, FortiAnalyzer-BigData 7.4.0 and before 7.2.7
Impactunauthorized code or commands
Exploit PrerequisitesPrivileged access with CLI capabilities
CVSS 3.1 Score4.2 

Similarly, FortiSandbox is affected by CVE-2024-54026, a medium-severity error-based SQL injection vulnerability in the device deletion feature.

Risk FactorsDetails
Affected ProductsFortiSandbox 4.4.6, 4.4.5, 4.4.4, 4.4.3, 4.4.2 and earlier
Impactunauthorized code or commands
Exploit PrerequisitesPrivileged access, crafted HTTP requests
CVSS 3.1 ScoreMedium severity
Command Injection and Authorization Issues
OS command injection Vulnerability – CVE-2024-32123 and CVE-2024-54018

The security update also addresses multiple command injection vulnerabilities, including CVE-2024-32123, which affects FortiAnalyzer and FortiManager products.

This medium-severity vulnerability involves improper neutralization of special elements in OS commands, potentially allowing command injection through the CLI. 

Risk FactorsDetails
Affected ProductsFortiManager 7.4.3, 7.4.2, 7.4.1, 7.4.0, 7.2.5 and earlier
Impactunauthorized code or commands
Exploit PrerequisitesPrivileged access, crafted HTTP requests
CVSS 3.1 ScoreMedium severity

FortiSandbox users should be particularly concerned about CVE-2024-54018, another medium-severity OS command injection vulnerability in the administrative interface.

Risk FactorsDetails
Affected ProductsFortiSandbox 4.4.5, 4.4.4, 4.4.3, 4.4.2, 4.4.1 and earlier
Impactunauthorized code or commands
Exploit PrerequisitesPrivileged access, crafted HTTP requests
CVSS 3.1 ScoreMedium severity
Server-Side Security Vulnerability – CVE-2024-52960

Client-side security enforcement issues have also been discovered, with CVE-2024-52960 affecting FortiSandbox’s virtual machine download feature. This medium-severity vulnerability could undermine server-side security mechanisms if exploited.

Risk FactorsDetails
Affected ProductsFortiSandbox 5.0.0, 4.4.6, 4.4.5, 4.4.4, 4.4.3 and earlier
Impactunauthorized commands
Exploit PrerequisitesAuthentication with at least read-only permission
CVSS 3.1 ScoreMedium severity
Recommendations for Fortinet Customers

Fortinet strongly recommends customers upgrade to the latest versions of affected products as outlined in the security advisories. 

Organizations using FortiOS, FortiSandbox, or other affected products should prioritize these updates based on the severity ratings and their deployment configurations. 

Administrators should consult Fortinet’s Upgrade Path Tool for specific upgrade paths. The company continues to emphasize its commitment to security through its dedicated PSIRT process and consistent security patch delivery.

Leave a Comment

Your email address will not be published. Required fields are marked *

*
*