Authentication Bypass Vulnerability in Fortinet FortiClient
CVE-2024-47574 is a high-severity vulnerability affecting Fortinet's FortiClient for Windows, specifically versions 7.4.0, 7.2.4 through 7.2.0, 7.0.12 through 7.0.0, and 6.4.10 through 6.4.0. This vulnerability allows a low-privilege attacker to bypass authentication using an alternate path or channel, enabling them to execute arbitrary code with elevated privileges via spoofed named pipe messages.
Description of the Vulnerability
The flaw is categorized as an authentication bypass (CWE-288) and has been assigned a CVSS base score of 7.8, indicating a high level of severity. The exploitation of this vulnerability can lead to significant security risks, including:- Arbitrary Code Execution: Attackers can execute malicious code with the privileges of a higher-privileged user, potentially compromising the entire system.
- Privilege Escalation: The attacker can escalate their own privileges from low to high, gaining access to sensitive data and system configurations.
Technical Details
The vulnerability exploits the use of Windows named pipes, which are a method for inter-process communication in Windows operating systems. Named pipes can be manipulated by attackers to send spoofed messages that bypass normal authentication checks within the FortiClient application.Exploitation Scenario
- Initial Access: An attacker with low privileges on a Windows machine running an affected version of FortiClient initiates the attack.
- Spoofing Named Pipe Messages: The attacker sends crafted messages through named pipes to the FortiClient service.
- Execution of Malicious Code: If successful, the FortiClient processes these messages as legitimate commands, allowing the attacker to execute arbitrary code with elevated privileges.
Mitigation
Fortinet has released patches for this vulnerability, urging users to upgrade their FortiClient installations to secure versions:- Upgrade from 7.4.0 to 7.4.1
- Upgrade from 7.2.x versions (7.2.0 - 7.2.4) to 7.2.5
- Upgrade from 7.0.x versions (7.0.0 - 7.0.12) to 7.0.13
- Users of all 6.4.x versions should migrate to a fixed release.