Hot topics close

Critical Fortinet’s FortiClient EMS flaw actively exploited in the wild

Critical Fortinets FortiClient EMS flaw actively exploited in the wild
Researchers released a PoC exploit for a critical flaw in Fortinet's FortiClient EMS software, which is actively exploited.

Critical Fortinet’s FortiClient EMS flaw actively exploited in the wild

Pierluigi Paganini March 21, 2024

Researchers released a PoC exploit for a critical flaw in Fortinet’s FortiClient Enterprise Management Server (EMS) software, which is actively exploited.

Security researchers at Horizon3 have released a proof-of-concept (PoC) exploit for a critical vulnerability, tracked as CVE-2023-48788 (CVSS score 9.3), in Fortinet’s FortiClient Enterprise Management Server (EMS) software. The vulnerability is now actively exploited in attacks in the wild.

The vulnerability CVE-2023-48788 is a critical pervasive SQL injection issue that resides in the DAS component.

“An improper neutralization of special elements used in an SQL Command (‘SQL Injection’) vulnerability [CWE-89] in FortiClientEMS may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted requests.” reads the advisory.

Below are the affected versions and the release that addressed this flaw.

Version Affected Solution
FortiClientEMS 7.2 7.2.0 through 7.2.2 Upgrade to 7.2.3 or above
FortiClientEMS 7.0 7.0.1 through 7.0.10 Upgrade to 7.0.11 or above

Thiago Santana from the ForticlientEMS development team and UK NCSC reported the issue to the company.

The initial advisory reported that Fortinet was not aware of attacks in the wild exploiting this vulnerability.

However, the company has updated the advisory confirming that “this vulnerability is exploited in the wild.”

Horizon3’s Attack Team published a technical analysis of this vulnerability and the PoC exploit. The researchers demonstrated how to turn this SQL injection issue into remote code execution using the built-in xp_cmdshell functionality of Microsoft SQL Server.

The researchers explained that the database was not configured to run the xp_cmdshell command, however it was possible to do it using a few other SQL statements.

“The POC we are releasing only confirms the vulnerability by using a simple SQL injection without xp_cmdshell. To enable RCE, altering the POC is necessary.” reads the analysis published by Horizon3.

“There are various log files in C:\Program Files (x86)\Fortinet\FortiClientEMS\logs that can be examined for connections from unrecognized clients or other malicious activity. The MS SQL logs can also be examined for evidence of xp_cmdshell being utilized to obtain command execution.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, FortiClient)

Similar news
News Archive
  • March 23
    March 23
    CNN 10 - March 23, 2020
    23 Mar 2020
    2
  • Mytheresa
    Mytheresa
    Ukraine War, China Closures, Supply Chain Woes Hit Mytheresa Q3 Growth
    10 May 2022
    1
  • Sherlyn Chopra
    Sherlyn Chopra
    VIDEO | Sherlyn Chopra raps for Team India during World Cup semi-final against New Zealand
    10 Jul 2019
    2
  • Bulldog
    Bulldog
    Boy, nine, dies after dog attack at Tencreek Holiday Park in Cornwall
    14 Apr 2019
    5
  • Barratt
    Barratt
    Future of Redrow's headquarters in North Wales 'is secure' under takeover
    9 Feb 2024
    21
This week's most popular news