Fortinet FortiGate < 7.2.5 — RCE
A heap overflow in the FortiGate SSL-VPN web management interface allows unauthenticated remote code execution. Upgrade FortiOS to 6.0.17 / 6.2.15 / 6.4.13 / 7.0.12 / 7.2.5 or later immediately.
Full unauthenticated code execution on the FortiGate firewall. An attacker can read VPN credentials, modify firewall rules, install backdoors, and pivot to the internal network through the device that is protecting it. This class of vulnerability has been used by ransomware groups to gain initial access to enterprise networks.
The SSL-VPN web management portal in FortiOS fails to validate memory bounds when processing certain HTTP requests. An unauthenticated attacker can send a crafted HTTP packet that overflows the heap, overwriting function pointers and achieving code execution on the FortiGate device. The exploit works against the internet-facing VPN portal.
📧
Phishing link
🖼
Malicious file
🔓
Server compromised
Probably yes if any of these apply:
Mandiant identified exploitation of FortiOS SSL-VPN zero-days by a suspected China-linked actor (UNC3886) in June 2023. The group deployed custom malware (BOLDMOVE) on compromised FortiGate devices. CISA and FBI issued a joint advisory recommending immediate patching. Over 250,000 FortiGate devices were estimated to have internet-exposed SSL-VPN portals at the time of disclosure.
Manual remediation steps
⏱ 30 minutes including device restartCheck Current FortiOS Version
# From FortiGate CLI:
get system status
# Note the "Version" field
Immediate Mitigation (disable SSL-VPN)
# If SSL-VPN is not business-critical, disable it temporarily:
config vpn ssl settings
set status disable
end
Apply the Firmware Upgrade
execute restore image ftp <server> <filename>
Check for Indicators of Compromise
# Look for unexpected admin accounts
show system admin
# Check for recently modified system files
fnsysctl ls -la /data/lib
fnsysctl ls -la /data/bin
Verify Fixed Version
get system status | grep Version
# Must show 7.2.5+ / 7.0.12+ / 6.4.13+ / 6.2.15+ / 6.0.17+
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.
References