WARNING: NEW RCE VULNERABILITIES AFFECTING FORTIWEB, FORTIPROXY AND FORTIOS, PATCH AND VERIFY YOUR SYSTEMS ASAP!
CVE-2023-29183
CVSS score: 7.3 (high)
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Sources
https://fortiguard.com/psirt/FG-IR-23-068
https://www.fortiguard.com/psirt/FG-IR-23-106
Risks
FortiNet released a security fix to patch two vulnerabilities leading to remote code execution. Both vulnerabilities have a high impact on all vertices of the CIA triad (Confidentiality, Integrity, Availability).
The US Cybersecurity and Infrastructure Security Agency (CISA) warns that exploitation of these flaws could lead to full system compromise.
The Centre for Cyber security Belgium recommends system administrators to patch vulnerable systems as soon as possible and to analyze system and network logs for any suspicious activity. If your organization has already identified an intrusion or incident, please report it via: https://cert.be/en/report-incident.
Description
CVE-2023-29183 is an improper neutralization of input vulnerability. The flaw affects FortiOS and FortiProxy. Both are products of Fortinet’s. An authenticated attacker who successfully exploits this vulnerability could trigger malicious JavaScript code execution via crafted guest management setting.
CVE-2023-34984 is a failure in the protection mechanism of FortiWeb, a web application firewall from FortiNet. Successfully exploiting this vulnerability may allow an attacker to bypass XSS (cross-site scripting) and CSRF (cross-site request forgery) protections.
Recommended Actions
The Centre for Cyber Security Belgium strongly recommends upgrading your software:
For CVE-2023-34984
Upgrade to FortiWeb version 7.2.2 or above
Upgrade to FortiWeb version 7.0.7 or above
For CVE-2023-29183
Upgrade to FortiProxy version 7.2.5 or above
Upgrade to FortiProxy version 7.0.11 or above
Upgrade to FortiOS version 7.4.0 or above
Upgrade to FortiOS version 7.2.5 or above
Upgrade to FortiOS version 7.0.12 or above
Upgrade to FortiOS version 6.4.13 or above
Upgrade to FortiOS version 6.2.15 or above