Hello everybody. If you use FortiManager from FortiNet you should be prepared to grab the latest available release from the support portal and upgrade.

Patches aren’t out yet. Mitigation is available. If you have FortiManager facing the internet, I’d say remove it from the internet now. #threatintel https://mastodon.green/@fthy/113299522822025433

fthy (@[email protected])

Patch your FortiManager now. Limit access to it to only from dedicated jump-servers. #fortinet #fortimanager #infosec

Mastodon.green
Stealth rewrite as patches aren’t available yet.
Different vuln from earlier this year, but same component, to give scale of unpatched Forti problem. https://infosec.exchange/@shadowserver/113300701642489996
The Shadowserver Foundation (@[email protected])

Attached: 2 images We are now reporting in our feeds Fortinet IPs still likely vulnerable to CVE-2024-23113 (format string pre-auth RCE). This vulnerability is known to be exploited in the wild. 87,390 IPs found on 2024-10-12 scan. Top: US (14K), Japan (5.1K), India (4.8K) We are sharing daily feeds of vulnerable IPs in our Vulnerable HTTP report: https://shadowserver.org/what-we-do/network-reporting/vulnerable-http-report/ You can track CVE-2024-23113 vulnerable instances over time on our Dashboard: https://dashboard.shadowserver.org/statistics/combined/time-series/?date_range=other&d1=2024-10-09&d2=2024-10-12&source=http_vulnerable&source=http_vulnerable6&tag=cve-2024-23113%2B&dataset=unique_ips&style=stacked Patch details from Fortinet (Feb 8th, 2024): https://fortiguard.com/psirt/FG-IR-24-029 Note this vulnerability has been added recently to the US CISA's Known Exploited Vulnerabilities catalog https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Infosec Exchange
Does anybody know if the FortiManager zero day situation has a CVE and/or patch yet?
FortiGate have released one of the six new versions of FortiManager which fix the actively exploited zero day in the product… but they’ve not issued a CVE or documented the issue existing in the release notes. Next week maybe?
And we have another FortiManager patch out: https://www.reddit.com/r/fortinet/s/JNCdPoxAgb
Fortigate currently having the world's least secret zero day used by China play out, including in FortiManager Cloud.. but everybody is confused.

Fortinet's last security blog included a section called "A Call to the Industry: Doing the Right Thing for the Security of our Society", which is good. It talks about "transparent disclosure of discovered vulnerabilities" and "radical transparency".

In other news, Fortigate are almost two weeks into knowing they have a zero day which is actively exploited in one of their products, haven't issued a CVE, haven't done a public writeup, and have patch notes that don't mention the vuln.

I should also point out Fortinet's blog is about zero day vulnerabilities in a competitor's product being exploited by a nation state... which is exactly the same as the FortiManager situation they haven't disclosed publicly or privately given IOCs for. They released extensive details on their competitor's woes.
On a positive note, blog title!
FortiNet drama rumbling on
FortiNet's security portal has been broken for 24 hours now https://www.fortiguard.com/psirt
PSIRT Advisories | FortiGuard Labs

FortiGuard Labs
People are quite openly posting what is happening on Reddit now, threat actors are registering rogue FortiGates into FortiManager with hostnames like 'localhost' and using them to get RCE.

Somebody posted the list of impacted FortiManager versions and fixed versions on Reddit. 3 of the versions don’t have patches available.

It’s not on the list but people are saying in the thread FortiManager Cloud is impacted too.

Fortinet’s PSIRT advisory website is still offline.

FGFM - FortiGate to FortiManager Protocol Shodan dork, save for later this week.

https://beta.shodan.io/search?query=port%3A541+xab

Documentation: https://docs.fortinet.com/document/fortigate/6.4.0/ports-and-protocols/373486/fgfm-fortigate-to-fortimanager-protocol

"The FortiGate to FortiManager (FGFM) protocol is designed for FortiGate and FortiManager deployment scenarios, especially where NAT is used. These scenarios include the FortiManager on public internet while the FortiGate unit is behind NAT, FortiGate unit is on public internet while FortiManager is behind NAT..."

I've written a thing, and drawn a logo in crayon and an explainer in MS Paint.

Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs

https://doublepulsar.com/burning-zero-days-fortijump-fortimanager-vulnerability-used-by-nation-state-in-espionage-via-msps-c79abec59773

Burning Zero Days: FortiJump FortiManager vulnerability used by nation state in espionage via MSPs

Did you know there’s widespread exploitation of FortiNet products going on using a zero day, and that there’s no CVE? Now you do. The thread is a bit wild, I didn’t know about the FortiNet private…

DoublePulsar

While investigating this one I've found 4 different peeps at 4 different orgs with this.. We really need infosec vendors, when they say they want radical transparency, to have radical transparency.

It should not be me naming vulns in crayon still in 2024.

https://infosec.exchange/@grey/113353081444957562

grey (@[email protected])

@[email protected] Can confirm these deets. Definitely worth looking through your logs for newly registered devices named localhost. If you have FDS they will show up as unregistered FDS devices :ablobcatwave:

Infosec Exchange

btw that blog includes a banger detail I'm not sure is widely known yet - threat actor has been combo'ing the other CISA KEV vuln (from earlier in the year) to enter FortiGate, then used this to enter the managing FortiManager, and then using that to go back downstream - i.e. jumping over zoned networks.

As far as I can piece together, this has been happening for a while.

FortiGate admins report active exploitation 0-day. Vendor isn’t talking.

Vulnerability allowing remote code execution has been discussed since at least 9 days ago.

Ars Technica
FortiNet just released FortiManager 7.0.13, which fixes the FortiManager zero day for 7.0. It isn't listed in the release notes as a fix, instead they list an unrelated CVE for an old SSH vuln. https://docs.fortinet.com/product/fortimanager/7.0
FortiManager 7.0

So there's a record somewhere, as FortiNet aren't listing it for some reason, here's the fixed versions for the zero day:

FortiManager 7.4.5: https://docs.fortinet.com/document/fortimanager/7.4.5/release-notes/723553/fortimanager-7-4-5-release

FortiManager 7.2.8:
https://docs.fortinet.com/document/fortimanager/7.2.8/release-notes/972111/resolved-issues

FortiManager 7.0.13:
https://docs.fortinet.com/document/fortimanager/7.0.13/release-notes/972111/resolved-issues

There are currently no patches for 7.6 or 6.4 branches, and the mitigation doesn't work on those.

FortiManager 7.4.5 Release | Release Notes

FortiNet have now gone public about FortiJump, aka CVE-2024-47575 https://fortiguard.fortinet.com/psirt/FG-IR-24-423

Not in the advisory but exploitation stems to at least September, and it's being used to enter downstream networks.

#FortiJump

PSIRT | FortiGuard Labs

None

FortiGuard Labs
"Reports have shown this vulnerability to be exploited in the wild."

FortiNet have updated the PSIRT entry to include IPs (there’s one additional) and forensics info.

I would recommend FortiManager customers check their boxes, even if the FortiManager itself isn’t directly internet facing - if you have FortiGate firewalls that are.

(Also if you have global Netflow data, check out those IPs 🫡)

FortiJump explained in a GIF
FortiJump activity in the wild dating back to August now, place your bets about how far back this goes.
Mandiant says new Fortinet flaw has been exploited since June

A new Fortinet FortiManager flaw dubbed "FortiJump" and tracked as CVE-2024-47575 has been exploited since June 2024 in zero-day attacks on over 50 servers, according to a new report by Mandiant.

BleepingComputer
Looping this is in as it's both a funny article and provides a way to fingerprint patching of a prior FGFM vuln from February 2024. https://cyberplace.social/@GossiTheDog/113307720748822638
Kevin Beaumont (@[email protected])

lol at this Watchtowr write up - it’s on the money. Vulns from 1998. Wait until they see the new FortiManager zero day, I wanna see their write up. https://labs.watchtowr.com/fortinet-fortigate-cve-2024-23113-a-super-complex-vulnerability-in-a-super-secure-appliance-in-2024/

Cyberplace
@GossiTheDog
do you have any MDR that you can recommend ?

@GossiTheDog the IP is also in mandiants writeup but they don't list it as IoC.

We have seen 2/5 of those on Sept. 23
I'm reasonable sure that there should be more but can't confirm any more at the moment.

@GossiTheDog Every time one of these lists pops up I am so relieved that none of our IPs are on them, lol.
Fox-IT (@foxit) on X

Our SOC detected suspicious activity from 158.247.199[.]37 directed at FortiManager ports as early as May 2024. #threatintel #fortianalyzer #fortijump https://t.co/kRBlM8SNID

X (formerly Twitter)

@GossiTheDog

Needs the crayon logo superimposed over the dog

@GossiTheDog dumb question but also want to verify, why append xab to the port number in the shodan query?
@GossiTheDog Hey have you seen any more IPs since your report? Seeing more IPs mentioned on Reddit and in the PSIRT.
@GossiTheDog I guess the arstechnica article lit some fires?

@GossiTheDog Kevin, you sure that FortiGate devices are able to register by default?

From what I understand the allow_register variable is disabled by default, and when enabled, needs to be coupled with the register_passwd to set a password used during registration.

Also, I am told that the "localhost" devices are appearing under the Unregistered devices tab.

@GossiTheDog How can a public company do this shit? The SEC should be eating their souls.
@GossiTheDog FortiOS 6.4 is end of support already (since 2024-09-30), and I’d assume FortiManager 6.4 is also end of support (since they usually keep the version / support lifetimes of FortiOS / FortiManager in sync). Occasionally they’ve done urgent security patches for “recently end of support” products, so who knows if 6.4 will get patched. (7.0 has been out at least a couple of years at this point; 7.6 is new mid 2024.)
@GossiTheDog Thanks for the Blog article - i was wondering why the "xab" string in the shodan dork tho?
@GossiTheDog more like Форты-НЕТ
@GossiTheDog I've been keeping an eye on this situation and have been waiting for something more substantive-looking to share with my boss. This was the article I ultimately pointed to today.
@GossiTheDog Especially since it's been exploited for over a month now...
@GossiTheDog But a number of years ago, at RSA, Fortinet paid for Maseratis to circle the convention center all day. Surely, this means they are trustworthy and transparent! 😏
@GossiTheDog Can confirm these deets. Definitely worth looking through your logs for newly registered devices named localhost. If you have FDS they will show up as unregistered FDS devices 
@GossiTheDog not a crayon logo I cannot
@hacks4pancakes @GossiTheDog think he’d be willing to do some graphics design for Worldview? Imagine the Year In Review with his artwork setting the theme.
@GossiTheDog I'm still not sure what this has to do with the Scottish Parliament.

@GossiTheDog

Uh-oh. Have we reached the "logo in ms paint" level of severity? Yikes!

@GossiTheDog fortunately for the only on-net customer who has unrestricted FGFM (for some reason Forti require using the CLI to create so-called 'local in' rules to ACL mgmt protocols and so nobody does) enabled on their WAN interface, I am coincidentally going to be in their building tomorrow visiting another customer, so I can pop in and ask them when the last time their MSP patched them. I won't be shocked if they are vulnerable to 2024-23113.
@GossiTheDog What is the "xab" thing for? It seems to match some hex value (\xab) from the info read from this port (541).

@GossiTheDog So, as I'm trying to gauge impact or potential for impact for my clients; if they're not using Fortimanager, they're fine?

I was getting mixed reporting of fortigates getting enrolled into OTHER fortimanagers, though. That's my real worry. The mitigation for this would be to ensure that fortigates aren't just left hanging out in the wind right?

@GossiTheDog I am so tired of #Fortinet bullshit...
@GossiTheDog Just how many days are we gonna burn putting out the fires created by this shit ? How many intrusions are we gonna find years later that we'll trace back to a bloody #fortimanager compromise ?...
@GossiTheDog I'm cranky, I need sugar.
@Cirio @GossiTheDog I worked there more than a decade ago as my first job out of university. After that experience, I'd never trust them. One of their key selling points was that they had the lowest cost solution. Well, you get what you pay for I guess
@GossiTheDog The site is intermittenty accesible. Two new advisories related to FortiManager have been published, but they are not related to this issue (as far as I can tell). And I’m beginning to wonder if people thirsty for info are DDoSing the site
@GossiTheDog It's been a lot of fun to watch. Reddit at it's ... best?
@GossiTheDog Sooooo ... free fortigate licences ? :D
@GossiTheDog One day I wish my organization would let me move us away from the god awful Fortinet ecosystem.

@GossiTheDog

Can someone please explain this attack flow to me like I'm a 10-year-old?

@dangoodin @GossiTheDog Agreed, been trying to find more details all day. (I'm late to this party.)

@dangoodin @GossiTheDog I don't know details, but from reading this with my PSIRT hat on this is what I'm leaning toward: it sounds to me like there's an issue with stealing certs, so first they steal a cert, then they load it onto a Forti device they own, and use the cert to register their attacker-controlled device to your organization. I only see one mention of certs, so alongside the mention of localhost, perhaps they just need to establish some means of being trusted (self-signed for localhost, vs. stolen cert via this vuln?) and then the onboard an attacker-controlled device into the fortimanager pool and use that to cement their access.

From there, they can configure their way into your network or possibly take other admin actions (eg. possibly sync configs from trustworthy managed devices to their own?) It's not super clear from these threads. The mitigation to prevent unknown serial numbers suggests that a speedbump to fast onboarding prevents even a cert-bearing(?) device from being included into the fortimanager

@ckure
@dangoodin @GossiTheDog
Without any further information this is my take as well.

You don't have to steal a certificate however, you just need a valid certificate from any active fortigate appliance it seems

@GossiTheDog I didn't know what is Fortinet, so I googled it and google says "global leader of cybersecurity solutions and services". I don't know what happened, but I guess Fortinet caught a group of hackers and now is revealing hackers secrets, right? I wouldn't expect anything else from the global leader.