Security researchers at Volexity have uncovered a critical zero-day vulnerability in Fortinet's Windows VPN client, FortiClient, that enables attackers to extract user credentials directly from the application's memory. The vulnerability was discovered while investigating the DEEPDATA malware family used by a Chinese threat actor known as BrazenBamboo.
The vulnerability was identified in July 2024 during Volexity's analysis of a DEEPDATA malware sample. The security flaw allows attackers to extract VPN credentials that remain in the process memory even after a user authenticates to the VPN. Volexity reported the vulnerability to Fortinet on July 18, 2024, and while Fortinet acknowledged the issue on July 24, it remains unresolved at the time of publication.
FIGURE 1: FortiClient Memory Extraction Code
The vulnerability exists in FortiClient's latest version (v7.4.0) and allows attackers to extract sensitive information including usernames, passwords, and remote gateway details from two different JSON objects stored in memory. Notably, this approach does not work on older versions of the FortiClient VPN client.
The exploitation technique bears similarities to a previously documented vulnerability from 2016, which also involved credential exposure in memory based on hardcoded offsets. However, that earlier vulnerability was never assigned a CVE identifier.
The discovery was made while investigating DEEPDATA, a sophisticated post-exploitation tool developed by BrazenBamboo. This malware family includes 12 unique plugins designed for various data theft operations, with the FortiClient exploitation capability implemented through a plugin named "msenvico.dll."
FIGURE 2: DEEPDATA Architecture Diagram
FIGURE 3: DEEPDATA Plugin Capabilities Table
DEEPDATA's capabilities extend beyond VPN credential theft to include:
Extraction of credentials from 18 different sources
Collection of data from messaging apps like WeChat, WhatsApp, and Signal
Audio recording capabilities
Browser data theft from major browsers
System information gathering
While a patch is pending, organizations using FortiClient VPN should:
Monitor for unauthorized access attempts
Consider alternative VPN solutions if immediate mitigation is required
Deploy memory monitoring solutions to detect potential credential theft attempts
The discovery emphasizes the critical importance of regular security auditing of VPN clients and the need for vendors to implement secure credential handling practices in memory-resident applications.
This vulnerability remains unpatched as of November 2024, and no CVE has been assigned yet. Organizations are advised to monitor Fortinet's security advisories for updates.
Visit our website to get cybersecurity updates like this, thesecmaster.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive tips like this.
You may also like these articles:
How to Fix CVE-2022-42475- A Critical Buffer Overflow Vulnerability in FortiOS SSL-VPN
How to Fix CVE-2023-27997- A Critical Heap-Based Buffer Overflow Vulnerability in FortiOS?
How to Fix the New Security Bypass Vulnerabilities in Fortinet Products
Breaking Down the Latest July 2023 Monthly PSIRT Advisory Report From Fortinet
Anthony Denis a Security News Reporter with a Bachelor's in Business Computer Application. Drawing from a decade of digital media marketing experience and two years of freelance writing, he brings technical expertise to cybersecurity journalism. His background in IT, content creation, and social media management enables him to deliver complex security topics with clarity and insight.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.