Skip to main content

CVE-2024-21754: Improper access control in Fortinet FortiProxy

Low
VulnerabilityCVE-2024-21754cvecve-2024-21754
Published: Tue Jun 11 2024 (06/11/2024, 14:32:01 UTC)
Source: CVE
Vendor/Project: Fortinet
Product: FortiProxy

Description

A use of password hash with insufficient computational effort vulnerability [CWE-916] affecting FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions, 6.4 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions, 2.0 all versions may allow a privileged attacker with super-admin profile and CLI access to decrypting the backup file.

AI-Powered Analysis

AILast updated: 06/25/2025, 16:24:10 UTC

Technical Analysis

CVE-2024-21754 is a vulnerability identified in Fortinet's FortiProxy and FortiOS products affecting multiple versions, including FortiProxy 7.4.2 and below, 7.2 all versions, 7.0 all versions, and 2.0 all versions, as well as FortiOS versions 7.4.3 and below, 7.2 all versions, 7.0 all versions, and 6.4 all versions. The vulnerability stems from the use of password hashes with insufficient computational effort, classified under CWE-916 (Use of Password Hash With Insufficient Computational Effort). This weakness allows a privileged attacker who already has super-admin profile access and command-line interface (CLI) access to decrypt backup files that are supposed to be protected. Essentially, the cryptographic protection of backup files is weak due to the use of easily reversible or computationally inexpensive password hashes, enabling an attacker with high privileges to extract sensitive configuration data from backups. The vulnerability requires high privileges (super-admin) and CLI access, and also user interaction (UI:R) according to the CVSS vector. The CVSS v3.1 base score is 1.7, indicating a low severity level, primarily because exploitation requires significant privileges and user interaction, and the impact is limited to confidentiality with no integrity or availability impact. No known exploits are reported in the wild at this time. The vulnerability affects critical network security infrastructure components, as FortiProxy and FortiOS are widely used for web proxying, firewall, and VPN services. The ability to decrypt backup files could expose sensitive configuration details, including credentials, network topology, and security policies, potentially aiding further attacks if an attacker gains super-admin CLI access. However, the initial access requirement significantly limits the attack surface.

Potential Impact

For European organizations, the impact of CVE-2024-21754 is primarily a confidentiality risk concerning sensitive configuration backups of Fortinet FortiProxy and FortiOS devices. If an attacker with super-admin CLI access exploits this vulnerability, they could decrypt backup files, exposing critical network and security configurations. This exposure could facilitate lateral movement, privilege escalation, or targeted attacks within the network. Given Fortinet's widespread deployment in European enterprises, government agencies, and critical infrastructure sectors, the vulnerability could potentially aid sophisticated threat actors in reconnaissance and persistence activities. However, the requirement for super-admin privileges and CLI access means that the vulnerability is unlikely to be exploited directly by external attackers without prior compromise. The low CVSS score reflects the limited scope and difficulty of exploitation. Nonetheless, organizations with inadequate internal access controls or monitoring could be at risk of insider threats or post-compromise exploitation. The confidentiality breach could have regulatory implications under GDPR if sensitive personal data or security controls are exposed. The impact on availability and integrity is negligible, so direct service disruption or data manipulation is not expected from this vulnerability alone.

Mitigation Recommendations

1. Restrict super-admin and CLI access strictly to trusted personnel and enforce strong multi-factor authentication (MFA) for all privileged accounts to reduce the risk of unauthorized access. 2. Implement robust internal monitoring and alerting for any backup file creation, access, or export operations on FortiProxy and FortiOS devices to detect suspicious activities early. 3. Encrypt backup files using external, strong encryption tools before storage or transfer, adding an additional layer beyond the device's native protection. 4. Regularly audit and rotate privileged credentials and review access logs to identify any anomalous super-admin activities. 5. Apply vendor patches or updates as soon as they become available, even though no patch links are currently provided, monitor Fortinet advisories closely. 6. Limit backup file retention and ensure secure storage with strict access controls to minimize exposure. 7. Conduct internal security awareness training emphasizing the risks of privileged access misuse and the importance of safeguarding backup files. 8. Consider network segmentation to isolate management interfaces and CLI access points from general user networks to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
fortinet
Date Reserved
2024-01-02T10:15:00.526Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed162

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 6/25/2025, 4:24:10 PM

Last updated: 7/31/2025, 9:12:57 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats