CVE-2024-23108 Scanner
CVE-2024-23108 Scanner - OS Command Injection vulnerability in Fortinet FortiSIEM
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
19 days 17 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
The Fortinet FortiSIEM is an advanced security management solution widely used by enterprises for centralized log analysis, network security monitoring, and comprehensive compliance management. Deployed in diverse environments, it helps network teams to aggregate security data from across the organization, delivering insights into potential security threats and compliance status. Its user-friendly interface and robust feature set make FortiSIEM a popular choice among cybersecurity professionals. The tool offers real-time data collection and analysis, making it an essential part of an organization's security infrastructure. FortiSIEM integrates with numerous IT systems to provide a consolidated view of network activities and security status. Fortinet continues to update and enhance FortiSIEM to address evolving security threats and compliance requirements.
The OS Command Injection vulnerability in Fortinet FortiSIEM is a critical flaw that allows unauthenticated attackers to execute arbitrary commands on affected systems. This vulnerability arises from improper sanitization of the XML parsing of TEST_STORAGE elements, specifically within the mount_point field. If exploited, it can lead to unauthorized access and control over the system. This vulnerability can severely impact the integrity and availability of the FortiSIEM system and the network environments it monitors. Being rated as critical, it demands immediate remediation to prevent potential compromise of the system. Fortinet has addressed this vulnerability in newer versions beyond 7.1.1, urging users to update promptly.
The technical details of this vulnerability include an OS command injection point located in the Phoenix Monitor service. The vulnerable endpoint is exposed through the mount_point field within the XML parsing for TEST_STORAGE elements. Attackers can exploit this by injecting arbitrary shell commands, leading to Remote Code Execution. This vector allows unauthorized access without requiring any prior authentication, making it highly exploitable. It listens on port 7900 (TCP), a fact that can be leveraged to monitor or restrict access to potential malicious interactions. This vulnerability is classified under CWE-78 and tagged under CVE-2024-23108. To combat exploitation, network segmentation and careful monitoring of access logs are recommended.
If malicious attackers exploit the OS Command Injection vulnerability, the effects could be severe. Unauthenticated attackers could gain full control over the FortiSIEM system, leading to a complete compromise of the underlying infrastructure. This might allow them to exfiltrate sensitive data, disrupt security monitoring operations, and further move laterally within the network to target additional systems. Such a breach undermines the very purpose of FortiSIEM, which is to provide secure and centralized security monitoring. It exposes organizations to data theft, potentially damaging their reputation and compliance standing. Rapid remediation and implementation of network restrictions are crucial in minimizing these risks.
REFERENCES
- https://www.horizon3.ai/attack-research/disclosures/cve-2024-23108-fortinet-fortisiem-2nd-order-command-injection-deep-dive/
- https://fortiguard.com/psirt/FG-IR-23-130
- https://nvd.nist.gov/vuln/detail/CVE-2024-23108
- https://github.com/horizon3ai/CVE-2024-23108
- https://github.com/nomi-sec/PoC-in-GitHub