3.1 CVE-2024-50565

 

A improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15 and 6.2.0 through 6.2.16, Fortinet FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.15 and 2.0.0 through 2.0.14, Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and 6.2.0 through 6.2.13, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14 and 6.2.0 through 6.2.13, Fortinet FortiVoice version 7.0.0 through 7.0.2, 6.4.0 through 6.4.8 and 6.0.0 through 6.0.12 and Fortinet FortiWeb version 7.4.0 through 7.4.2, 7.2.0 through 7.2.10, 7.0.0 through 7.0.10 allows an unauthenticated attacker in a man-in-the-middle position to impersonate the management device (FortiCloud server or/and in certain conditions, FortiManager), via intercepting the FGFM authentication request between the management device and the managed device
https://nvd.nist.gov/vuln/detail/CVE-2024-50565

Categories

CWE-300 : Channel Accessible by Non-Endpoint
In order to establish secure communication between two parties, it is often important to adequately verify the identity of entities at each end of the communication channel. Inadequate or inconsistent verification may result in insufficient or incorrect identification of either communicating entity. This can have negative consequences such as misplaced trust in the entity at the other end of the channel. An attacker can leverage this by interposing between the communicating entities and masquerading as the original entity. In the absence of sufficient verification of identity, such an attacker can eavesdrop and potentially modify the communication between the original entities.

References

psirt@fortinet.com


 

CPE

cpe start end
Configuration 1
cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:* >= 7.4.0 < 7.4.3
Configuration 2
cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:* >= 6.0.0 < 6.4.9
cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:* >= 7.0.0 < 7.0.3
Configuration 3
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* >= 2.0.0 < 7.0.16
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* >= 7.2.0 < 7.2.10
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* >= 7.4.0 < 7.4.3
Configuration 4
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* >= 6.4.0 < 7.0.16
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* >= 7.2.0 < 7.2.9
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* >= 7.4.0 < 7.4.5
Configuration 5
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* >= 6.2.0 < 6.2.14
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* >= 6.4.0 < 6.4.15
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* >= 7.0.0 < 7.0.12
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* >= 7.2.0 < 7.2.5
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* >= 7.4.0 < 7.4.3
Configuration 6
cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* >= 6.2.0 < 6.2.14
cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* >= 6.4.0 < 6.4.15
cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* >= 7.0.0 < 7.0.12
cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* >= 7.2.0 < 7.2.5
cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* >= 7.4.0 < 7.4.3


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
466 Leveraging Active Adversary in the Middle Attacks to Bypass Same Origin Policy
Medium
57 Utilizing REST's Trust in the System Resource to Obtain Sensitive Data
Very High
589 DNS Blocking
590 IP Address Blocking
High
612 WiFi MAC Address Tracking
Low
613 WiFi SSID Tracking
Low
615 Evil Twin Wi-Fi Attack
Low
662 Adversary in the Browser (AiTB)
Very High
94 Adversary in the Middle (AiTM)
Very High


MITRE


Techniques

id description
T1040 Network Sniffing
T1185 Browser Session Hijacking
T1557 Adversary-in-the-Middle
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Mitigations

id description
M1018 In cloud environments, ensure that users are not granted permissions to create or modify traffic mirrors unless this is explicitly required.
M1017 Close all browser sessions regularly and when they are no longer needed.
M1017 Train users to be suspicious about certificate errors. Adversaries may use their own certificates in an attempt to intercept HTTPS traffic. Certificate errors may arise when the application’s certificate does not match the one expected by the host.
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.