Fortinet FortiOS & FortiProxy Authentication Bypass (CVE-2024-52965): Invalid Certificates, Real Threats
Introduction
Fortinet's widely deployed FortiOS and FortiProxy solutions are under threat from a critical authentication bypass vulnerability (CVE-2024-52965). This flaw allows attackers to bypass authentication using invalid PKI certificates, posing significant risks to enterprise security by enabling unauthorized API access and potentially persistent network compromise.
Technical Information
The core issue (CVE-2024-52965) stems from a missing critical authentication step (CWE-304) in Fortinet's FortiOS and FortiProxy products. Specifically, when API users authenticate with a combination of an API key and a PKI user certificate, the system neglects proper validation of the certificate's cryptographic integrity and revocation status. Attackers exploit this oversight by pairing valid API keys with intentionally invalid certificates—such as expired, self-signed, or revoked certificates—to bypass authentication entirely.
Attack Vectors and Exploitation Methods
- Unauthorized API Access: Attackers craft malicious API requests, leveraging valid API keys alongside invalid certificates to bypass authentication.
- Persistent Backdoors: Exploited accounts may create hidden administrative users, facilitating long-term unauthorized access.
- Credential Harvesting and Data Exfiltration: Attackers can extract sensitive SSL-VPN configurations and hashed credentials, storing them in archives like
/tmp/.tm
for exfiltration.
Affected Systems and Versions
- FortiOS: Versions 7.6.0 through 7.6.1, 7.4.0 through 7.4.5, 7.2.0 through 7.2.10, and versions prior to 7.0.16.
- FortiProxy: Versions 7.6.0 through 7.6.1, 7.4.0 through 7.4.8, 7.2.0 through 7.2.13, and versions prior to 7.0.20.
Vendor Security History
Fortinet has experienced several critical vulnerabilities in recent years, particularly within FortiOS and FortiProxy. Authentication bypass flaws and Node.js-related vulnerabilities have been recurring issues, suggesting potential gaps in Fortinet's security review and patch management processes.
References
Security teams should urgently prioritize patching and mitigation measures to protect against active exploitation of CVE-2024-52965.
Source: This report was created using AI
If you have suggestions for improvement or feedback, please reach out to us at [email protected]