Advisory 77

Advisory 77: FortiOS & FortiProxy - Authentication bypass in Node.js web socket module vulnerability

Release Date: 2nd of February 2025

Impact : HIGH / CRITICAL

TLP Rating: Clear

CERT Vanuatu (CERTVU) and the Department of Communication and Digital Transformation (DCDT) provide the following advisory.

This alert is relevant to Organizations who utilize affected Fortinet products. This alert is intended to be understood by technical users.

Customers are encouraged to upgrade to the latest version of FortiOS and FortiProxy and apply the mitigations, as detailed in the Fortinet notification.

What is it?

•    Fortinet has identified a critical vulnerability in FortiOS and FortiProxy. The vulnerability may allow an unauthenticated remote attacker to gain “super-admin” privileges.
•    The Fortinet vulnerability notification describes possible Indicators of Compromise (IOCs) and IPs associated with the threat actor, which may assist in identifying suspicious activity.
•    Fortinet has observed active exploitation of this vulnerability.
•    Fortinet advises that threat actors have been observed performing the following post-exploitation activities: 
•    Creating an admin account on the device with a random username.
•    Creating a Local User account on the device using a random name.
•    Creating a user group or adding the above local user to an existing SSL VPN user group.
•    Adding/changing other settings (firewall policy etc.)
•    Logging in the SSL-VPN with the above-added local users to get a tunnel to the internal network.

References

1.    https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/fortios-fortiproxy-authentication-bypass-nodejs-websocket-module-vulnerability?utm_source=linkedin&utm_campaign=feb-25&utm_medium=social&utm_content=alert-fortinet 
2.    https://www.fortiguard.com/psirt/FG-IR-24-535