The Information Highway

The Information Highway

Font size: +
2 minutes reading time (324 words)

Critical vulnerability discovered in FortiSIEM

Threat update

A new critical command injection vulnerability, CVE-2024-23108, was found in Fortinet's FortiSIEM solution. This vulnerability poses significant risks to organizations using the solution. 

Technical Detail and Additional Info

What is the threat?

CVE-2024-23108 impacts FortiSIEM versions 6.4.0 and higher. This vulnerability allows remote, unauthenticated attackers to execute commands as the root user on affected systems by sending specially crafted API requests. It originates from the improper neutralization of special elements used in OS commands, which can be manipulated to execute unauthorized commands via the datastore.py script. An attacker can leverage this flaw to gain root access to any Internet-exposed and unpatched FortiSIEM appliances.

Why is it noteworthy?

A proof-of-concept of the vulnerability has been released, making it a target for exploitation in the wild. To exploit the vulnerability, an attacker only needs to send crafted API requests to the targeted FortiSIEM supervisor component. Upon a successful, the attacker can conduct remote command execution as the root user, without authentication. This gives the attackers full control over affected systems that can lead to severe security breaches, data theft, and disruption of services. 

What is the exposure or risk?

With full control over affected systems, attackers can access sensitive information, manipulate data, disrupt operations, and move laterally to deepen the attack within the system. As organizations rely on FortiSIEM for security monitoring and event management, a successful exploit could lead to severe damage to their systems and compromise the integrity of their security infrastructure.

What are the recommendations?

 LBT Technology Group recommends the following actions to reduce the risk of exploitation and protect systems from potential attacks leveraging CVE-2024-23108:

  • Apply the latest security patches provided by Fortinet for FortiSIEM versions 6.4.0 and higher.
  • Implement strict access control measures.
  • Implement comprehensive monitoring and logging solutions.

References

 For more in-depth information about the recommendations, please visit the following links:




If you have any questions, please contact LBT's Sales Engineer.

Oracle WebLogic Server vulnerability
Hackers phish finance orgs using trojanized Minesw...

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Friday, 20 December 2024

Captcha Image

Top Breaches Of 2023

Customers Affected In T-Mobile Breach
Accounts Affected In MOVEit Breach
Customers Affected In MCNA Insurance Data Breach
Individuals Affected In PharMerica Data Breach
Users Affected In ChatGPT Major Data Breach
*Founder Shield End of Year 2023