Four Medium-severity security flaws have been detected that affect multiple Fortinet Networks devices. The vulnerabilities tracked under CVE identifiers CVE-2022-30307, CVE-2022-35842, CVE-2022-26122, and CVE-2022-38380 are medium-severity vulnerabilities with CVSS scores of 3.8, 3.7, 4.3, and 4.2 on the CVSS scale. As per the vendor, these vulnerabilities allow remote attackers to obtain sensitive information, bypass security restrictions, information discloser, and perform man-in-the-middle attacks on vulnerable Fortinet products. Since this flaw allows an unauthenticated, remote attacker to exploit this issue remotely and perform operations on the administrative interface, it is highly important to know how to fix the four new security bypass vulnerabilities in Fortinet products.
According to Fortigate, the most severe among these vulnerabilities is CVE-2022-38380. It’s been said, “When an unauthenticated, remote attacker exploits this vulnerability, he can get bypass the AV engine via manipulating MIME attachment with junk and pad characters in base64.” This blog post explains all four new security bypass vulnerabilities in Fortinet products and implementation steps on how you can fix these vulnerabilities.
A Short Intro About the FortiOS
FortiOS is a security-focused operating system that is designed to work with Fortinet’s line of security appliances. These appliances include the FortiGate firewall, the FortiWeb web application firewall, and the FortiMail email gateway. The OS is based on a hardened Linux kernel and includes features such as intrusion detection and prevention, virtual private networking, and data leak prevention. FortiOS is also available as a virtual appliance for use in cloud environments.
A Short Intro About the FortiMail
The FortiMail is a security appliance that provides email gateway and filtering capabilities. It can be used to protect an organization’s email infrastructure from spam, malware, and other threats. The appliance can also be used to enforce email policies, such as content filtering and data leak prevention. The FortiMail includes a web-based management interface for administrators to configure and monitor the appliance. It is available in both hardware and virtual appliance form factors.
A Short Intro About the FortiClient
The FortiClient is an enterprise-class endpoint security software suite that provides a comprehensive and robust security solution for your business. It includes a firewall, antivirus, web filtering, application control, vulnerability scanning, and much more. The FortiClient is easy to deploy and manage, and it offers superior protection against threats.
The FortiClient suite is available in both on-premises and cloud-based versions. The on-premises version is installed on your company’s servers, while the cloud-based version is hosted by Fortinet. Both versions offer the same features and benefits.
Fortinet has released advisories for four new security bypass vulnerabilities in Fortinet products that allows remote attackers to obtain sensitive information, bypass security restrictions, information discloser, and perform man-in-the-middle attacks on the vulnerable Fortinet products. Let’s see the summary of all the four flaws one after another.
This is a key management error vulnerability in Fortinet’s FortiO affecting the RSA SSH host key. The flaw allows an unauthenticated attacker to perform a man in the middle attack on the vulnerable products. The flaw affects FortiOS version 6.4.9, 7.0.6, and 7.2.0.
The vulnerability exists in Fortinet FortiOS due to the exposure of sensitive information in FortiOS SSL-VPN. Successful exploitation of this vulnerability could allow an unauthenticated, remote attacker to gain information about LDAP and SAML on the targeted system. The flaw affects FortiOS version 7.2.0, 7.0.6, 7.0.5, 7.0.4, 7.0.3, 7.0.2, 7.0.1, 7.0.0, 6.4.9, 6.4.8, 6.4.7, 6.4.6, 6.4.5, 6.4.4, 6.4.3, 6.4.2, 6.4.1, and 6.4.0.
This vulnerability exists in Fortinet AV Engine due to insufficient verification of data authenticity. A remote attacker could exploit this vulnerability by manipulating MIME attachments with junk and pad characters in base64. Successful exploitation of this vulnerability could allow an attacker to bypass security restrictions on the targeted system. The flaw affects FortiOS version FortiOS running AV engine version 6.2.168 and below and 6.4.274 and below. FortiMail running AV engine version 6.2.168 and below and 6.4.274 and below. FortiClient running AV engine version 6.2.168 and below and 6.4.274 and below.
This vulnerability exists in Fortinet FortiOS due to improper access control. A remote authenticated attacker could exploit this vulnerability by sending security-crafted requests. Successful exploitation of this vulnerability could allow an attacker to modify the interface settings via the API to bypass security restrictions on the targeted system. The flaw affects FortiOS: 7.2.0, 7.0.7, 7.0.6, 7.0.5, 7.0.4, 7.0.3, 7.0.2, 7.0.1, and 7.0.0.
List of the Four New Security Bypass Vulnerabilities in Fortinet Products with the products affected and corresponding patched version.
Sl. No. | CVE ID | CVSS Score | Description | Affected Products | Solution |
1 | CVE-2022-30307 | 3.8 Medium | RSA SSH host key lost at shutdown | FortiOS version 7.2.0 FortiOS version 7.0.6 FortiOS version 6.4.9 | Please upgrade to FortiOS version 7.2.2 or above Please upgrade to FortiOS version 7.0.8 or above Please upgrade to FortiOS version 6.4.10 or above |
2 | CVE-2022-35842 | 3.7 Medium | Telnet on the SSL-VPN interface results in information leak | FortiOS version 7.2.0 FortiOS version 7.0.0 through 7.0.6 FortiOS version 6.4.0 through 6.4.9 | Please upgrade to FortiOS version 7.2.2 or above Please upgrade to FortiOS version 7.0.7 or above Please upgrade to FortiOS version 6.4.10 or above |
3 | CVE-2022-26122 | 4.3 Medium | AV Engine evasion by manipulating MIME attachment | FortiOS running AV engine version 6.2.168 and below. FortiOS running AV engine version 6.4.274 and below. FortiMail running AV engine version 6.2.168 and below. FortiMail running AV engine version 6.4.274 and below. FortiClient running AV engine version 6.2.168 and below. FortiClient running AV engine version 6.4.274 and below. | Please upgrade AV engine to version 6.2.169 or above. Please upgrade AV engine to version 6.4.275 or above. Please upgrade to FortiMail version 7.2.0 or above Please upgrade to FortiMail version 7.0.3 or above Please upgrade to FortiMail version 6.4.7 or above Please upgrade to FortiOS version 7.0.8 or above. Please upgrade to FortiOS version 7.2.2 or above. |
4 | CVE-2022-38380 | 4.2 Medium | Read-Only users able to modify the Interface fields using the API | FortiOS version 7.2.0 FortiOS version 7.0.0 through 7.0.7 | Please upgrade to FortiOS version 7.2.1 or above Please upgrade to FortiOS version 7.0.8 or above |
There are multiple products affected by these four vulnerabilities. However, we have shared this information in the previous section extensively by the vulnerability. The following products are prone to these four new security bypass vulnerabilities.
FortiOS version 7.2.0
FortiOS version 7.0.0 through 7.0.7
FortiOS version 6.4.0 through 6.4.9
FortiOS running AV engine version 6.2.168 and below
FortiOS running AV engine version 6.4.274 and below
FortiMail running AV engine version 6.2.168 and below
FortiMail running AV engine version 6.4.274 and below
FortiClient running AV engine version 6.2.168 and below
FortiClient running AV engine version 6.4.274 and below
Fortinet acknowledged the vulnerability by releasing the patch last week. All the users of the vulnerable version of FrotiOS, FortiMail, and FortiClients are advised to upgrade their appliances to:
FortiOS version 7.2.2 or above, 7.0.8 or above, and 6.4.10 or above.
FortiOS running AV engine version 6.2.169 or above and 6.4.275 or above.
FortiMail running AV engine version 7.2.0 or above, 7.0.3 or above, and 6.4.7 or above.
FortiClient running AV engine version 7.0.8 or above and 7.2.2 or above.
Refer to the table from the previous section.
Refer to these community forums to see how to upgrade the FortiOS, FortiMail, and FortiClient.
If you want to go for the manual upgrade process, download the upgrade image from https://support.fortinet.com, go to the ‘File Upload’ tab and upload the image. For the recommended upgrade path, see Upgrade Path Tool.
Log into the FortiGate GUI as the admin administrative user.
Go to System > Fabric Management. The Firmware Version column displays the version and either (Feature) or (Mature).
Select the FortiGate, and click upgrade. The FortiGate Upgrade pane opens.
Click All Upgrades. The available firmware versions are displayed.
Select the target firmware, and see the upgrade options
You can instruct FortiOS to follow the upgrade path (referred to as a federated upgrade) or upgrade directly to the selected firmware version.In this example, the target firmware is 7.2.0 build 1157(GA), and Follow upgrade path is selected. According to the upgrade path, the device can be automatically upgraded to v7.0.5 but not all the way to 7.2.0.
Initiate the upgrade process
Select Follow upgrade path, and click Confirm and Backup Config. Then click Continue to initiate the upgrade. The FortiGate will take the backup of current configurations, transfer to the management computer, uploads the firmware image file, upgrade the firmware, and at last, reboot itself. This completes the upgradation of the FrotiOS.
We hope this post would help you know how to fix the four new security bypass vulnerabilities in Fortinet products. Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram, and subscribe to receive updates like this.
You may also like these articles:
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.