Article Details

Scrape Timestamp (UTC): 2024-11-14 22:23:29.392

Source: https://www.theregister.com/2024/11/14/fortinet_vpn_authentication_bypass_bug/

Original Article Text

Click to Toggle View

Fortinet patches VPN app flaw that could give rogue users, malware a privilege boost. Plus a bonus hard-coded local API key. A now-patched, high-severity bug in Fortinet's FortiClient VPN application potentially allows a low-privilege rogue user or malware on a vulnerable Windows system to gain higher privileges from another user, execute code and possibly take over the box, and delete log files. The bug is tracked as CVE-2024-47574, and it earned a 7.8 out of 10 CVSS severity rating. It affects FortiClientWindows version 7.4.0, 7.2.4 through 7.2.0, 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0. Fortinet patched the hole on Tuesday, so if you haven't already, upgrade to a fixed release. Pentera Labs' bug hunter Nir Chako found and reported the flaw to Fortinet, plus a second security oversight that allows someone or something nefarious on a system running the VPN client to alter SYSTEM-level registry keys that would otherwise be off limits. According to Chako, this latter flaw has been assigned CVE-2024-50564, though the vendor has not yet issued a security alert about it. However, it has also been fixed in the latest version, FortiClient 7.4.1.  "They said it will be published in the next advisory update," Chako told The Register, adding that advisory is slated for release on the December 10 Patch Tuesday. "From a security perspective, after testing version 7.4.1, we were able to validate that the patch prevented us from executing the techniques." Neither flaw appears to have been exploited in the wild. Fortinet did not immediately respond to The Register's inquiries. We will update this story if and when we hear back from the vendor. As Chako explains in this detailed technical write-up, exploiting CVE-2024-47574 involves using Windows named pipes with the FortiClient software to ultimately plant a script so that when a higher-privileged user next uses the VPN, that script is run with their privileges, and thus code execution is achieved with unauthorized powers. This privilege-escalation technique involves a step know as process hollowing. This could also be abused to delete log files, and make a user connect to an attacker-controlled server. Plus, when combined with the second vulnerability, CVE-2024-50564, a miscreant would be "able to edit SYSTEM level registry values within the HKLM registry hive," Chako said. Exploiting CVE-2024-50564 involves using a hard-coded local API encryption key that components of Fortinet's software use to exchange commands and data between themselves; it's not a VPN secret.

Daily Brief Summary

MALWARE // Fortinet Patches Critical Privilege Escalation in VPN Client

Fortinet fixed a high-severity vulnerability (CVE-2024-47574) in its FortiClient VPN software, affecting multiple versions on Windows.

The flaw allowed low-privilege users or malware to gain higher privileges, execute unauthorized code, and potentially take over a computer.

The vulnerability also enabled attackers to delete log files, elevate malware privileges, and alter system connections to attacker-controlled servers.

Alongside, a second vulnerability (CVE-2024-50564) was addressed, which allowed unauthorized editing of SYSTEM-level registry values.

Both vulnerabilities were reported by Pentera Labs; the higher-severity being publicly disclosed and patched, and the lower pending in a future advisory.

Fortinet has released version 7.4.1 of FortiClient, which resolves these vulnerabilities.

No evidence suggests these vulnerabilities were exploited in the wild.