Table of Contents
  • Home
  • /
  • Blog
  • /
  • Zero-Day Vulnerability in FortiClient VPN Allows Credential Theft
November 20, 2024
|
3m

Zero-Day Vulnerability in FortiClient VPN Allows Credential Theft


BrazenBamboo Exploits FortiClient Zero-Day Vulnerability

Security researchers at Volexity have uncovered a critical zero-day vulnerability in Fortinet's Windows VPN client, FortiClient, that enables attackers to extract user credentials directly from the application's memory. The vulnerability was discovered while investigating the DEEPDATA malware family used by a Chinese threat actor known as BrazenBamboo.

The Discovery

The vulnerability was identified in July 2024 during Volexity's analysis of a DEEPDATA malware sample. The security flaw allows attackers to extract VPN credentials that remain in the process memory even after a user authenticates to the VPN. Volexity reported the vulnerability to Fortinet on July 18, 2024, and while Fortinet acknowledged the issue on July 24, it remains unresolved at the time of publication.

Technical Details

FIGURE 1: FortiClient Memory Extraction Code

The vulnerability exists in FortiClient's latest version (v7.4.0) and allows attackers to extract sensitive information including usernames, passwords, and remote gateway details from two different JSON objects stored in memory. Notably, this approach does not work on older versions of the FortiClient VPN client.

The exploitation technique bears similarities to a previously documented vulnerability from 2016, which also involved credential exposure in memory based on hardcoded offsets. However, that earlier vulnerability was never assigned a CVE identifier.

BrazenBamboo's Arsenal

The discovery was made while investigating DEEPDATA, a sophisticated post-exploitation tool developed by BrazenBamboo. This malware family includes 12 unique plugins designed for various data theft operations, with the FortiClient exploitation capability implemented through a plugin named "msenvico.dll."

FIGURE 2: DEEPDATA Architecture Diagram

FIGURE 3: DEEPDATA Plugin Capabilities Table

DEEPDATA's capabilities extend beyond VPN credential theft to include:

  • Extraction of credentials from 18 different sources

  • Collection of data from messaging apps like WeChat, WhatsApp, and Signal

  • Audio recording capabilities

  • Browser data theft from major browsers

  • System information gathering

  • WiFi credential collection

Recommendations

While a patch is pending, organizations using FortiClient VPN should:

  1. Monitor for unauthorized access attempts

  2. Implement additional authentication layers

  3. Consider alternative VPN solutions if immediate mitigation is required

  4. Deploy memory monitoring solutions to detect potential credential theft attempts

The discovery emphasizes the critical importance of regular security auditing of VPN clients and the need for vendors to implement secure credential handling practices in memory-resident applications.

This vulnerability remains unpatched as of November 2024, and no CVE has been assigned yet. Organizations are advised to monitor Fortinet's security advisories for updates.

Visit our website to get cybersecurity updates like this, thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive tips like this. 

You may also like these articles:

Anthony Denis

Anthony Denis a Security News Reporter with a Bachelor's in Business Computer Application. Drawing from a decade of digital media marketing experience and two years of freelance writing, he brings technical expertise to cybersecurity journalism. His background in IT, content creation, and social media management enables him to deliver complex security topics with clarity and insight.

Recently added

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe