If the user has a low-privileged account, it may be possible for that user to grant themselves administrator privileges by exploiting this vulnerability.

FortiOS version 5.9.x through 7.0.x, and version 6.0.x through 7.0.7 contain an improper authentication vulnerability. An attacker may exploit this vulnerability by using an automated tool or a social engineering technique to fool the FortiGate unit into authenticating with an external server without any authentication credentials. An attacker may be able to obtain system or other privileged account information in this manner such as the user’s password or the user’s MAC address.

FortiOS versions 5.9.x through 7.0.x, and version 6.0.x through 7.0.7 contain an improper authorization vulnerability. An attacker may exploit this vulnerability by using an automated tool or a social engineering technique to fool the FortiGate unit into authorizing a connection for unauthenticated clients. This may allow an attacker to trick the FortiGate unit into allowing an external connection to the protected server, which may give the attacker access to the protected server.

FortiOS versions 5.9.x through 7.0.x, and version 6.0.x through 7.0.7 may allow a remote attacker with a low-privileged account to gain access to a protected server via the HTTP web server.

FortiOS versions 5.9.x through

The following table contains details on the FortiGate versions and impact of the vulnerability:

1.5
CVE-2022-38380
2.0
CVE-2022-38379
3.0
CVE-2022-38362, CVE-2022-38363

Mitigation Strategy - FortiGate 6.0.x  6.0.7

- Upgrade to FortiGate 6.0.x
- Enable HTTPS for FortiGate Control Plane and Services Engine
- Enable TLS 1.2 for the FortiSwitch

How to Detect if You Are Vulnerable

Users who are not familiar with the operation of their FortiGate unit may be vulnerable to these vulnerabilities. Users should be aware that if a user is not authenticated, it may be possible for that user to gain administrator privileges by exploiting this vulnerability.

The easiest way to identify if you are vulnerable to these vulnerabilities is by using the FortiGuard Discovery Tool. The tool will help users determine the firmware version of their unit and provide remediation steps depending on which version they have installed.

Timeline

Published on: 11/02/2022 12:15:00 UTC
Last modified on: 11/04/2022 14:56:00 UTC

References