Fortinet allegedly rings a bell about a critical authentication bypass vulnerability in FortiGate and FortiProxy appliances. The flaw has been tracked with an identifier CVE-2022-40684 and has got a score of 9.6 out of 10 on the CVSS scale. An unauthenticated, remote attacker could achieve an authentication bypass on the administrative interface on the vulnerable version of FortiGate and FortiProxy appliances. Since this flaw allows an unauthenticated, remote attacker to exploit this issue remotely and perform operations on the administrative interface, it is highly important to know how to fix CVE-2022-40684, a critical Authentication Bypass Vulnerability in FortiGate and FortiProxy.
FortiGate is a multi-purpose firewall that can be used to protect your network against various threats. It offers features such as Intrusion Prevention System (IPS), Application Control, and Anti-Virus/Anti-Spyware. FortiGate also provides web filtering, email filtering, and content filtering to block unwanted traffic and content.
FortiProxy is a web proxy that can be used to filter internet traffic and block unwanted websites. It offers features such as content filtering, URL filtering, and malware protection. FortiProxy also provides web caching to improve internet speed and performance.
If you are looking for a firewall or web proxy that can offer comprehensive protection for your home or business network, then FortiGate and FortiProxy are two great options to consider.
This is an authentication bypass vulnerability in FortiGate and FortiProxy. It allows an unauthenticated, remote attacker to exploit this issue remotely and perform operations on the administrative interface on susceptible devices. This vulnerability is rated Critical and assigned a CVSS score of 9.6 out of 10. Attackers could exploit this vulnerability just by sending a specially crafted HTTP(S) request. According to the Security researcher, Gitworm, more details about the flaw is not reveled yet due to security reasons.
As per the tweet, the following versions of FortiOS of FortiGate Firewall and FortiProxy Web Proxy are impacted. Users whose appliances are running the vulnerable versions of ProtiOS and FortiProxy should fix the CVE-2022-41352 vulnerability.
FortiOS: From 7.0.0 to 7.0.6, from 7.2.0 to 7.2.1
FortiProxy: From 7.0.0 to 7.0.6 and 7.2.0
Fortinet acknowledged the vulnerability by releasing the patch last week. All the users of the vulnerable version of FrotiOS and FortiProxy are advised to upgrade their appliances to v7.0.7 &7.2.2 and 7.0.7 & 7.2.1.
Fortinet | Vulnerable Versions | Patched Versions |
FortiOS | 7.0.0 – 7.0.67.2.0 – 7.2.1 | 7.0.77.2.2 |
FortiProxy | 7.0.0 – 7.0.67.2.0 | 7.0.77.2.1 |
Fortinet has published a temporary workaround for the user who can’t go for an upgrade immediately. The vendor asked the users to make the web console inaccessible from the public network and cover the admin console behind a VPN Firewall to access it from a remote place. In addition to this, users can enforce a firewall policy to “local-in traffic.”
Let’s see how to fix the fix CVE-2022-40684, a critical Authentication Bypass Vulnerability in FortiGate and FortiProxy.
If you want to go for the manual upgrade process, download the upgrade image from https://support.fortinet.com, go to the ‘File Upload’ tab and upload the image.
Log into the FortiGate GUI as the admin administrative user.
Go to System > Fabric Management. The Firmware Version column displays the version and either (Feature) or (Mature).
Select the FortiGate, and click upgrade. The FortiGate Upgrade pane opens.
Click All Upgrades. The available firmware versions are displayed.
You can instruct FortiOS to follow the upgrade path (referred to as a federated upgrade) or upgrade directly to the selected firmware version.In this example, the target firmware is 7.2.0 build 1157(GA), and Follow upgrade path is selected. According to the upgrade path, the device can be automatically upgraded to v7.0.5 but not all the way to 7.2.0.
Select Follow upgrade path, and click Confirm and Backup Config. Then click Continue to initiate the upgrade. The FortiGate will take the backup of current configurations, transfer to the management computer, uploads the firmware image file, upgrade the firmware, and at last, reboot itself. This completes the upgradation of the FrotiOS.
We hope this post would help you know how to fix CVE-2022-40684, a critical Authentication Bypass Vulnerability in FortiGate and FortiProxy. Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram, and subscribe to receive updates like this.
You may also like these articles:
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.