1.0 Introduction
Recently, Fortinet has released a security update to address a critical vulnerability in Fortinet’s FortiManager API and is actively exploited in the wild.
2.0 Impact
This vulnerability allows unauthenticated remote attackers to execute arbitrary code or commands, potentially leading to data theft and network compromise.
3.0 Affected Products
- FortiManager version 7.6.0
- FortiManager version 7.4.0 through 7.4.4
- FortiManager version 7.2.0 through 7.2.7
- FortiManager version 7.0.0 through 7.0.12
- FortiManager version 6.4.0 through 6.4.14
- FortiManager version 6.2.0 through 6.2.12
- FortiManager Cloud version 7.4.1 through 7.4.4
- FortiManager Cloud version 7.2.1 through 7.2.7
- FortiManager Cloud version 7.0.1 through 7.0.12
- FortManager Cloud version 6.4 all versions
4.0 Indicators of Compromised (IOCs)
- Unregistered devices named “localhost” in FortiManager
- Log entries showing API commands to add unregistered “localhost” devices
- Presence of /tmp/.tm and /var/tmp/.tm files
-
Connections from the following IP addresses:
- 45.32.41.202
- 104.238.141.143
- 158.247.199.37
- 45.32.3.2
5.0 Recommendations
CyberSecurity Malaysia encourages users and administrators to review the
Fortinet Security Updates for Multiple Products
and apply necessary updates.
Kindly refer to the following URL: https://fortiguard.fortinet.com/psirt/FG-IR-24-423
Generally, Cyber999 advises the users of the devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact us through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17:30 MYT
Web:
https://www.mycert.org.my
5.0 References