Fortinet fixes bug letting unauthenticated hackers run code as root

3 years ago 187
BOOK THIS SPACE FOR AD
ARTICLE AD

CVE-2021-32589 bug in FortiManager and FortiAnalyzer enables remote code execution without authentication

Fortinet has released updates for its FortiManager and FortiAnalyzer network management solutions to fix a serious vulnerability that could be exploited to execute arbitrary code with the highest privileges.

Both FortiManager and FortiAnalyzer are enterprise-grade network management solutions for environments with up to 100,000 devices. They are available as a physical appliance, as a virtual machine, in the cloud, or hosted by Fortinet.

Organizations can use the products to manage deploy and configure devices on the network as well as to collect and analyze the generated logs to identify and eliminate threats.

Patch and workaround available

Fortinet has published a security advisory for the issue, which is currently tracked as CVE-2021-32589, saying that it is a use-after-free (UAF) vulnerability in FortiManager and FortiAnalyzer fgfmsd daemon.

This type of bug occurs when a section of memory is erroneously marked as free and a program then tries to use it, resulting in a crash.

However, Fortinet says that sending a specially crafted request to the “FGFM” port of a target device “may allow a remote, non-authenticated attacker to execute unauthorized code as root.”

The company highlights that FGFM is disabled by default on FortiAnalyzer and can be turned on only on some hardware models: 1000D, 1000E, 2000E, 3000D, 3000E, 3000F, 3500E, 3500F, 3700F, 3900E.

The products affected by CVE-2021-32589 are the following:

FortiManager FortiAnalyzer
versions 5.6.10 and below versions 5.6.10 and below
versions 6.0.10 and below versions 6.0.10 and below
versions 6.2.7 and below versions 6.2.7 and below
versions 6.4.5 and below versions 6.4.5 and below
version 7.0.0 version 7.0.0
versions 5.4.x  

If updating is not possible, one workaround is to disable FortiManager features on the FortiAnalyzer unit using the following command:

config system global set fmg-status disable

Credited for finding and responsibly reporting the vulnerability to Fortinet is Cyrille Chatras, a reverse engineer and pentester from Orange group that previously discovered and reported bugs in products from Nokia, Juniper, Red Hat, and in open-source Android [1, 2, 3, 4].

CISA has also published an advisory encouraging users and administrators to review the vulnerability information from Fortinet and apply the updates.

Read Entire Article