Fortinet FortiOS Security Update Advisory (CVE-2024-21762, CVE-2024-23113)

Overview

 

Fortinet (https://www.fortinet.com) has made available an update that fixes vulnerabilities in FortiOS. Users of affected versions are advised to update to the latest version.

 

Affected Products

 

CVE-2024-21762

Applicable if SSLVPN is enabled and in use, otherwise not relevant

  • FortiOS versions 7.4.0 through 7.4.2
  • FortiOS versions 7.2.0 through 7.2.6
  • FortiOS versions 7.0.0 through 7.0.13
  • FortiOS versions 6.4.0 through 6.4.14
  • FortiOS versions 6.2.0 through 6.2.15
  • All versions of FortiOS 6.0
  • FortiProxy versions 7.4.0 through 7.4.2
  • FortiProxy versions 7.2.0 through 7.2.8
  • FortiProxy versions 7.0.0 through 7.0.14
  • FortiProxy versions 2.0.0 through 2.0.13
  • All versions of FortiProxy 1.0, 1.1, and 1.2

 

CVE-2024-23113

Only if enabled in conjunction with FortiManager, otherwise not relevant

  • FortiOS versions 7.4.0 through 7.4.2
  • FortiOS versions 7.2.0 through 7.2.6
  • FortiOS versions 7.0.0 through 7.0.13
  • FortiPAM version 1.2.0
  • FortiPAM versions 1.1.0 through 1.1.2
  • All versions of FortiPAM 1.0
  • FortiProxy versions 7.4.0 through 7.4.2
  • FortiProxy versions 7.2.0 through 7.2.8
  • FortiProxy versions 7.0.0 through 7.0.14
  • FortiSwitchManag versions 7.2.0 through 7.2.3
  • FortiSwitchManag versions 7.0.0 through 7.0.3

 

Resolved Vulnerabilities

 

Arbitrary code execution vulnerability due to out-of-bounds writes in FortiOS. An unauthenticated remote attacker could execute arbitrary code or commands via a specially crafted HTTP request. (CVE-2024-21762)
Arbitrary code execution vulnerability due to an external control format string in the FortiOS fgfmd daemon. An unauthenticated, remote attacker could execute arbitrary code or commands via a specially crafted request. (CVE-2024-23113)

 

Vulnerability Patches

 

Vulnerability patches were made available in the February 8, 2024 update. Please follow the instructions on the reference site to update to the latest vulnerability patch version.

CVE-2024-21762

If you have SSLVPN enabled, we strongly recommend upgrading to the resolved version using the links below. (Note: disabling SSLVPN WEB MODE only will not help)

version patch Version
FortiOS 7.4 7.4.3 and later versions
FortiOS 7.2 7.2.7 and later versions
FortiOS 7.0 7.0.14 and later versions
FortiOS 6.4 6.4.15 and later versions
FortiOS 6.2 6.2.16 and later versions
FortiOS 6.0 migrate to a newer version
FortiProxy 7.4 7.4.3 or later
FortiProxy 7.2 7.2.9 or later
FortiProxy 7.0 7.0.15 and later versions
FortiProxy 2.0 2.0.14 and later versions
FortiProxy 1.2 moving to a newer version
FortiProxy 1.1 move to a newer version
FortiProxy 1.0 move to a newer version

 

CVE-2024-23113

If you are using FortiProxy in conjunction with FortiManager, it is strongly recommended that you upgrade to the resolved version using the links below. (FortiOS 6.x is not affected by this vulnerability and no action is required.)

version patch Version
FortiOS 7.4 7.4.3 and later versions
FortiOS 7.2 7.2.7 and later versions
FortiOS 7.0 7.0.14 and later versions
FortiPAM 1.2 1.2.1 and later versions
FortiPAM 1.1 1.1.3 and later versions
FortiPAM 1.0 move to a newer version
FortiProxy 7.4 7.4.3 or later version
FortiProxy 7.2 7.2.9 or later
FortiProxy 7.0 7.0.16 and later versions
FortiSwitchManager 7.2 7.2.4 and later versions
FortiSwitchManager 7.0 7.0.4 and later versions

 

Referenced Sites

 

[1] CVE-2024-21762 Detail
https://nvd.nist.gov/vuln/detail/CVE-2024-21762
[2] CVE-2024-23113
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23113
[3] FortiOS – Out-of-bound Write in sslvpnd
https://www.fortiguard.com/psirt/FG-IR-24-015
[4] FortiOS – Format String Bug in fgfmd
https://www.fortiguard.com/psirt/FG-IR-24-029