Skip to content

How to find Fortinet assets on your network

Latest Fortinet vulnerabilities 

Fortinet has issued advisories for its FortiAnalyzer, FortiAnalyzer-BigData, FortiManager, and FortiOS products.

  • CVE-2023-50176 detailed in FG-IR-23-475 is rated high with a CVSS score of 7.1, and may allow an unauthenticated attacker to hijack a user session.
  • CVE-2024-23666 detailed in FG-IR-23-396 is rated high with a CVSS score of 7.1 and may allow an authenticated, read-only user the ability to execute “sensitive operations”.

What is the impact?

CVE-2024-23666, which affects FortiAnalyzer and FortiManager products, requires that an attacker (or malicious user) is authenticated against the system. A read-only user can potentially execute sensitive operations through crafted requests, bypassing client-side enforcement through the web interface. CVE-2023-50176, which affects the SSLVPN component of FortiOS, is a session fixation vulnerability that allows an unauthenticated attacker the ability to hijack an authenticated user’s session via a “phishing SAML authentication link”.

Are updates or workarounds available?

The vendor has released patches for all affected products. They recommend following the upgrade path using their upgrade tool.

How to find potentially vulnerable systems with runZero

From the Asset Inventory, use the following query to locate systems running potentially vulnerable software:

hw:FortiManager OR hw:FortiAnalyzer OR os:FortiOS

March 2024

On March 12th, 2024, Fortinet disclosed several vulnerabilities in their FortiOS, FortiProxy, and FortiClient products:

  • FG-IR-23-328 – a buffer overflow vulnerability in the handling of form-based authentication in the FortiOS and FortiProxy captive portals, allowing remote, unauthenticated attackers to execute arbitrary code. This vulnerability has been assigned CVEs CVE-2023-42789 and CVE-2023-42790. These vulnerabilities have a CVSS score of 9.3, indicating that they are critical.

  • FG-IR-24-007 – a SQL injection vulnerability in the FortiClient Enterprise Management Server. This vulnerability has been designated CVE-2023-48788, and has been given a CVSS score of 9.8 (critical).

  • FG-IR-23-390 – a log injection vulnerability in the FortiClient Enterprise Management Server. This vulnerability has been assigned CVE-2023-47534 and a CVSS score of 7.7 (high).

  • FG-IR-23-103 – a remote code execution vulnerability in the FortiManager product. This vulnerability has been designated CVE-2023-36554 with a CVSS score of 7.7 (high). Note that the vulnerable subsystem is not installed by default.

  • FG-IR-23-013 – an information disclosure vulnerability in the FortiGuard SSL-VPN product. This vulnerability has been designated CVE-2024-23112 and given a CVSS score of 7.2 (high).

Upon successful exploitation of these vulnerabilities, attackers could execute arbitrary code on the vulnerable system or disclose privileged information. Fortinet released updates to mitigate this issue and all users were urged to update immediately.

How to find FortiOS, FortiProxy or FortiClient operating systems

From the Asset Inventory, use the following query to locate assets running the FortiOS or FortiProxy operating systems, which may be vulnerable:

os:"FortiOS" OR os:"FortiProxy"

Additionally, from the Services Inventory, use the following query to locate potentially vulnerable systems:

html.title:="FortiClient Endpoint Management Server"

CVE-2024-21762 (February 2024)

On February 8th, 2024, Fortinet disclosed a serious vulnerability in their FortiOS operating system, used by multiple Fortinet products.

The issue, CVE-2024-21762, allowed attackers to execute arbitrary code on vulnerable devices. The vendor has indicated that this is a critical vulnerability. The vendor reports that there are indications that this vulnerability may be actively exploited in the wild. Upon successful exploitation of these vulnerabilities, attackers could execute arbitrary code on the vulnerable system.

Fortinet released an update to mitigate this issue and all users were urged to update immediately. Additionally, the vendor indicated that disabling the SSL-VPN functionality of the device would mitigate the issue.

How to find FortiOS devices

From the Asset Inventory, use the following query to locate assets running the FortiOS operating system which may potentially be vulnerable:

os:"FortiOS" AND tcp:443

CVE-2022-40684 (October 2022)

News surfaced in October 2022 of a critical authentication bypass vulnerability present in the web administration interface of some Fortinet products. Successful exploitation of this vulnerability (tracked as CVE-2022-40684) via crafted HTTP and HTTPS requests could provide remote attackers with admin-level command execution on vulnerable FortiOS devices including FortiGate firewalls, FortiProxy web proxies, and FortiSwitchManager assets.

With a CVSS critical score of 9.6, attackers running admin-level commands on compromised assets may have had the ability to persist presence, explore connected internal networks, and exfiltrate data. At the time Fortinet was aware of at least one exploit of this vulnerability in the wild, and Bleeping Computer offered a Shodan search showing more than 140k publicly accessible FortiGate devices potentially running vulnerable FortiOS. Additionally, security researchers with Horizon3.ai planned on publishing an exploit PoC. For admins wanting to check if a FortiOS/FortiProxy/FortiSwitchManager asset had been exploited, Fortinet provides an indicator of compromise (see the “Exploitation Status” section).

Fortinet called out the vulnerable FortiOS, FortiProxy, and FortiSwitchManager versions in their advisory and had made updates available for affected products. Admins were advised to ensure that affected models were updated to the latest version as soon as possible. If updates could not be completed in the near term, Fortinet provided some mitigation steps (see the “Workaround” section) that could be taken to secure vulnerable assets.

How to find FortiOS, FortiProxy, and FortiSwitchManager assets

From the Asset Inventory, runZero users entered the following pre-built query to locate FortiOS, FortiProxy, and FortiSwitchManager assets:

os:FortiOS or product:FortiProxy or product:FortiSwitchManager

 

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Pandora FMS NG 779 RRR

SAML Authentication Enhancements

Updated and improved authentication in Pandora FMS console using SAML, ensuring compatibility with SAML environments in Azure and with simpleSAML 2.

New General Event Instructions

Just like the instructions for changing the state of events, it is now possible to configure general default instructions that will be displayed when the instructions for changing the state are missing or should not be displayed.

IPAM Plugin Improvements

The IPAM Discovery MS Windows® Agent Plugin has new enhancements that allow you to update all the “Occupied”, “Available”, “Managed” and “Unmanaged” data that was previously only possible to update from Pandora FMS server.

IPAM Tasks from Satellite Servers

It is now possible to configure IPAM tasks in Pandora FMS console so that they can be run from a Satellite server with remote configuration enabled.

Credential Store Improvement in Satellite servers

Pandora FMS Satellite Servers now have the credential store for SSH, WMI and SNMPv3 modules. These credentials can also be encrypted in the configuration files used by Satellites to ensure their privacy.

Improvement in Discovery Plugin: MongoDB®

Included the ability to launch custom SQL queries to generate monitoring modules in the Discovery MongoDB plugin.

Policy Enforcement Priority in Autoconfiguration

To improve performance in monitoring policy enforcement, it is now possible to prioritize agent autoconfiguration rules, so that policies with higher priority are applied before the rest.

New macros for network modules

It is now possible to use “_agentalias_” and “_agentname_” macros as the target IP address in network modules.

Improved SNMP Trap Alerts

SNMP trap alerts can be configured to filter their triggers by the “Subtype” field.

Improved Alert Recovery

Included an option in alert recovery to be performed only upon the change of status to “normal” of a module. This option is configurable on each alert template.

Configuration Options for Collecting Logs

OpenSearch® setup in Pandora FMS Web Console for collecting logs now has more options that allow you to adjust some OpenSearch® configuration parameters for each environment.

Improvements and small changes

Case# GitLab# Description
N/A 2361 New feature for credential encryption in monitoring through SSH, WMI and SNMP 3. It includes new tokens that are used globally in the Satellite server or at agent level for their corresponding modules.
10719 6728 By means of the macros _agentalias_ and _agentname_, and if these fields contain a valid IP address, these macros can be added to the Target IP field of the modules for subsequent monitoring.
12514 8092
  • Related: MR 79
Alerts by SNMP trap can also be filtered by subtype (Subtype trap).
N/A 9669 New audit Information widget.
14567 and 14585 9905 You may add general read-only instructions to any type of event, regardless of the rest of the fields. Included the same mechanism for API 2.0 and PFMS CLI.
N/A 11527 For IPAM discovery tasks, you may now configure PFMS server or the Satellite server to handle said task.
N/A 11748 Added prioritization to agent autoconfiguration when applying monitoring policies.
N/A 12755 New event list report based on saved filter.
N/A 13638 Added the Recovery only on Normal status token to alert templates, so that alert recovery is performed only for normal state.
N/A 13785
  • Related: 12463, 12489, 13786, 13787, 13790, 14110, 14643.
New feature for Software Agents in MS Windows® performed through Inventory of installed patches and comparison with the list of patches to be installed.
N/A 14193 New custom queries for MongoDB® database monitoring using Discovery PFMS

Known changes and limitations

Case# GitLab# Description
N/A 9918
  • Related: 13642 and 13991
Added support for user authentication with SAML 2.0 (SimpleSAMLphp server) while supporting previous versions.
N/A 12781 Module-based, agent-based, and group-based event reports will be deprecated in the LTS release in 2025.
N/A 13945 Added new index configuration section to the Log Collector, so that, optionally, four important parameters may be defined in OpenSearch.

Fixed vulnerabilities

Case# GitLab# Description
N/A CVE-2024-35308 Acknowledgement: i[@]qvq.im 14684 Fixed the arbitrary reading of the operating system file by a user registered in PFMS Web Console (plugins section).
N/A CVE-2024-9987 Acknowledgement: i[@]qvq.im 14685 Fixed access to read-only CSV data for any agent module by a registered user in PFMS Web Console (console extensions section).

Bug Fixes

Case# GitLab# Description
N/A 10062 Fixed searches by module name in the Monitor detail view to make literal queries with the following characters: %, _, [, ], {, }, -, ^. The only non-verbatim search character is the asterisk, so it can be searched literally if between quotation marks (and any search that includes quotation marks will be literal).
N/A 12962
  • Related: MR 79
Fixed special days for leap years.
N/A 13073 Fixed the display and style of the applied updates view (Warp Journal) to the product style.
N/A 13114 Fixed the description of the DNS plugin.
N/A 13250 Fixed the CLI PFMS command update_agent option update_gis_data, to only take values zero and one.
N/A 13255 Fixed the update_group command (PFMS CLI) to avoid hierarchy paradoxes against the same group or with groups related to other groups.
N/A 13442 Fixed the default value and description of token syncserver.
N/A 13511
  • Related: MR 79
Removed widget “Welcome message to” for failing to function as expected.
N/A 13522 Fixed visual glitches for both dark and light themes in the Credential Store.
N/A 13523 Added a warning message to module template management in case you did not select any Private Enterprise Number (PEN).
N/A 13553 Fixed visual glitches in Permissions Report PDF.
N/A 13747 Fixed the following commands in HTTP 500 errors in API 1.0:
  • get id_group_agent_by_name
  • get id_group_agent_by_alias
  • get group_agent_by_name
17620 13782 Fixed Cron Jobs task editing and/or addition in the Command Center (Metaconsole).
N/A 13792 Fixed the scope of users regarding the special group All in Inventory Alerts, so that they may have access to it only if they have specific permissions on it.
N/A 13794 Fixed the Cluster view so that only users who have permissions on the group to which the cluster belongs may access it.
N/A 13797 Fixed and limited agent deletion in Monitoring Policies for users who do not have permissions on the agent groups.
N/A 13799
  • Related: 14585
Fixed the display of tasks belonging to group ALL in IPAM if users do not have permission on said group. Fixed other permissions for different types of user profiles.
N/A 13811 Fixed the first uninitialized state in web module creation if applicable.
N/A 13818
  • Related: 13731, 13783, 14581
Fixed the correct interpretation and execution of macros in custom event responses if the display command option is enabled when running a command (view used for debugging).
N/A 13857
  • Related: 13803, 13804, 13840, 13848
Fixed a major bug in the Command Center (Metaconsole) that affected centralized services and services on nodes when added as a service element.
N/A 13819 Restricted access to Visual Consoles both in nodes and in the Command Center (Metaconsole) by means of the use of URLs by users without a VM profile.
17738 13826 Fixed the application of Regex conditions for received monitoring data in character string imodules, to detect state changes.
17656 13829 Fixed external alert addition in monitoring policies when extended characters are used in modules. To that end, the exact matching feature in regular expressions was also added.
N/A 13836 Removed repetitive message in HA environment alerting. It is verified that it appears in a timely manner according to the type of detected error and without repetitions.
N/A 13854 Removed the warning message in the event alerts view, which was only valid for versions prior to 779.
N/A 13855 Fixed the operation of basic security monitoring in the installation of the Software Agent for MS Windows® (Windows Server 2022®).
17827 13865 Fixed error HTTP 500 when saving bulk monitoring policy operations without having made any changes.
N/A 13917 Fixed mass operations on agents in centralized environments, specifically in the secondary group description editing.
N/A 13952 Fixed agent group disabling for counting agents in use according to license terms.
17541 14065 Fixed the token to explore all virtual machines and CPU and memory data collecting for monitoring XenServer® with Discovery PFMS.
N/A 14095 Fixed the token generation process for users using the PFMS API 2.0.
N/A 14109 Fixed several errors in the API 2.0 PFMS when paying certain fields with special enumeration.
18329 14137 Fixed image display in base64 in WUX monitoring when generating PDF.
18349 14147 Fixed unsolicited login to Web Console when using PFMS API 2.0.
18362 14152 Fixed inverse threshold application in monitoring policies.
N/A 14163 Fixed the WUX server to stop if the specified IP address to be monitored is out of reach.
N/A 14171
  • Related: 12374, MR 79
Fixed Oracle monitoring to connect in sysdba, thick and thin mode while maintaining cryptographic compatibility ®.
18394 14189
  • Related: MR 79
Fixed the use of threads and cores used to streamline data collecting in VMWare monitoring in Discovery PFMS.
18465 14192 Fixed duplicity in agent creation caused by a misconfigured token in VMWare monitoring with Discovery PFMS.
18651 14273
  • Related: 11815
Fixed the possibility of choosing another agent in synthetic module creation.
18691 14305
  • Related: 14289
Fixed access to users with ACLs and secondary groups to remote operation with Pandora RC.
N/A 14291
  • Related: 12941, 13973, MR 79
Interval correction in Dataserver modules.
N/A 14342 Fixed token display in the PFMS API 1.0.
18848 14381 En Fixed graph display in Monitor view in the Command Center (Metaconsole).
N/A 14417
  • Related: 14418
Fixed inventory enablement (basic options) in Software Agents.
18902 14507 Fixed agent duplication in MySQL monitoring with Discovery PFMS.
N/A 14822 Fixed connection to the nodes for alert display from the Command Center (Metaconsole).
N/A 14521 Fixed the default event filter assignment in every user profile in both Command Center and nodes.
N/A 14533 and 14639 Fixed the use of the Command Center as an update repository for centralized nodes.
N/A 14536
  • Related: 14164
Fixed the use of double quotation marks (character escape) in event update in PFMS API 2.0.
N/A 14540 Fixed the Discovery server for updating the extra_data field (data received in JSON).
N/A 14651 Fixed Error 500 when accessing the View Map in Recon Task.
N/A 14657
  • Related: 14256
Fixed filter in event reports for the Command Center and nodes.
N/A 14701 Fixed offline update (version comparison).
N/A 14706 Visually enhanced the agent configuration interface and the module interface.
N/A 14734 Fixed plugin pandora_df_used to always return values in bytes and thresholds in percentages.
N/A 14825
  • Related: 14844 and 14848
Checked the operation in Visual Consoles of the elements Serialized pie graph, Bars graph, Event history graph and Simple value.
N/A 14867
  • Related: 14865
Fixed ratings in vulnerability monitoring so that they fit a range of 0 to 10 points.
N/A 14865 Fixed the duplicated addition of the same software with different versions in vulnerability monitoring. Now it only takes into account the next version to the one installed for rating calculation.
N/A 14862 Fixed PFMS server restart for version 780 after an online update. For version 779, Pandora FMS must be manually restarted.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

JumpCloud 宣佈首屆免費虛擬 IT 專業會議

JumpCloud Inc. 正式開放 JumpCloudLand 的註冊,這是公司首次舉辦的全球性使用者會議,將於 2025 年 1 月 28 日以虛擬形式免費舉行。這場針對 IT 專業人士的盛會將幫助參與者提升技能、掌握行業趨勢,並探索職業與企業成長的新機遇。

活動期間,參加者將能與行業領袖直接交流、與同行分享經驗,並學習創新的方法來實現團隊和業務的成功。

「我們深知 IT 團隊正面臨著混合辦公與遙距工作環境帶來的挑戰,」JumpCloud 產品負責人 Joel Rennich 表示。「無論是管理混合型員工、處理過時工具、應對工具膨脹,還是滿足合規要求,這些問題都迫切需要解決。因此,我們舉辦 JumpCloudLand,為 IT 專業人士提供解決方案,幫助他們掌握新策略,在快速變化的環境中保持競爭力。」

活動重點

  • 交流互動:在輕鬆的虛擬環境中與 IT 領導者和同行建立聯繫,共享技術挑戰與解決方案
  • 知識增長:參加高影響力的專題會議,學習簡化日常操作並提升工作流程效率的新方法
  • 職業提升:發掘創新的 IT 策略,助力達成 2025 年目標。參與者還可獲得免費 JumpCloud 優惠券。

主要議程

  • 技術專題:參與實用技能培訓,搶先了解 JumpCloud 的最新創新技術,學習如何最大化利用現有工具簡化工作流程。
  • 解決方案專題:探討突破性解決方案,重塑團隊的 IT 策略,幫助您在行業中保持領先。
  • MSP 專題:專為託管服務提供商 (MSP) 設計,重點分享改善和擴展業務的實用策略。
  • 協作專題:學習如何整合 JumpCloud 與其他工具,讓您的工作更高效、更簡單。

準備好迎接更簡單、更安全的 IT 未來了嗎?與全球 IT 專業人士共同探索新知識、交流經驗,為 IT 的未來做好準備。

關於 JumpCloud

JumpCloud® 提供一個統一的開放式目錄平台,使 IT 團隊和 MSP 能夠輕鬆、安全地管理公司企業中的身份、裝置和存取權限。通過 JumpCloud,用戶能夠從任何地方安全工作,並在單一平台上管理其 Windows、Apple、Linux 和 Android 裝置。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×