--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'RCE vulnerabilities in Fortinet products' version: '1.0' number: '2023-012' original_date: 'February 16, 2023' date: 'February 20, 2023' --- _History:_ * _20/02/2023 --- v1.0 -- Initial publication_ # Summary On February 16, 2023, Fortinet released advisories regarding critical vulnerabilities in FortiNAC and FortiWeb products that may allow unauthenticated attackers to perform remote arbitrary code or command execution [1]. The first vulnerability identified as `CVE-2022-39952` (CVSS score of 9.8) and is related to the FortiNAC product. FortiNAC is Fortinet’s network access control solution that enhances the Security Fabric. It also provides protection against IoT threats, extends control to third-party devices, and orchestrates automatic responses to a wide range of networking events [2,3]. The second vulnerability identified as `CVE-2021-42756` (CVSS score of 9.8) and is related to FortiWeb products. FortiWeb is a web application firewall (WAF) that protects web applications and APIs from attacks that target known and unknown exploits and helps maintain compliance with regulations [4,5]. # Technical Details The vulnerability `CVE-2022-39952` is due to an external control of file name or path vulnerability in FortiNAC web server, and may allow an unauthenticated attacker to perform arbitrary write on the system [6]. The vulnerability `CVE-2021-42756` is due to multiple stack-based buffer overflow vulnerabilities in FortiWeb's proxy daemon, and may allow an unauthenticated remote attacker to achieve arbitrary code execution via specifically crafted HTTP requests [7]. # Affected Products **CVE-2022-39952** [6]: - FortiNAC version 9.4.0; - FortiNAC version 9.2.0 through 9.2.5; - FortiNAC version 9.1.0 through 9.1.7; - FortiNAC 8.8 all versions; - FortiNAC 8.7 all versions; - FortiNAC 8.6 all versions; - FortiNAC 8.5 all versions; - FortiNAC 8.3 all versions. **CVE-2021-42756** [7]: - FortiWeb 5.x all versions; - FortiWeb versions 6.0.7 and below; - FortiWeb versions 6.1.2 and below; - FortiWeb versions 6.2.6 and below; - FortiWeb versions 6.3.16 and below; - FortiWeb 6.4 all versions. # Recommendations Upgrade FortiNAC products to [6]: - FortiNAC version 9.4.1 or above; - FortiNAC version 9.2.6 or above; - FortiNAC version 9.1.8 or above; - FortiNAC version 7.2.0 or above. Upgrade FortiWeb products to [7]: - FortiWeb 7.0.0 or above; - FortiWeb 6.3.17 or above; - FortiWeb 6.2.7 or above; - FortiWeb 6.1.3 or above; - FortiWeb 6.0.8 or above. # References [1] [2] [3] [4] [5] [6] [7]