At the recent Black Hat 2019 conference held in Las Vegas this past August 3-8, security researchers discussed their discovery of security vulnerabilities that impacted several security vendors, including Fortinet.
SSL VPN Vulnerabilities
Two of the vulnerabilities directly affected Fortinet’s implementation of SSL VPN. They are:
- CVE-2018-13379 (FG-IR-18-384) – This is a path traversal vulnerability in the FortiOS SSL VPN web portal that could potentially allow an unauthenticated attacker to download files through specially crafted HTTP resource requests. Other files could be read by an attacker using this same path traversal vulnerability.
Remote Password Change Vulnerability
In addition, it was also discovered that FortiOS included a string of code that had been created for a specific customer request that had been inadvertently bundled into the general FortiOS release. This code enabled a user to change their password when it was close to expiring. However, due to the vulnerability listed above, where remote, unauthenticated attackers could access arbitrary files on targeted systems, this code became accessible and could be potentially used to remotely change the password of an SSL VPN web portal user.
Here are the details:
- CVE-2018-13382 (FG-IR-18-389) An Improper Authorization vulnerability in the SSL VPN web portal might allow an unauthenticated attacker to change the password of an SSL VPN web portal user using specially crafted HTTP requests.
In May, FortiGuard Labs has released patches and signatures for CVE-2018-13379, CVE-2018-13383, and CVE-2018-13382. The errant code string has also been removed from the FortiOS code base. A patch has also been released for all affected versions of FortiOS for this vulnerability.
In addition, we have prepared two FortiGuard signatures that block the exploitation of these vulnerabilities:
This signature identifies the code string used to change a user’s password
This signature addresses CVE-2018-13379, which is a dependence for the post-authentication vulnerability CVE-2018-13383.
Our customer’s security is our first priority and we urge customers to immediately implement all appropriate patch updates and signatures.