PSIRT Advisories

FortiNAC - java untrusted object deserialization RCE

Summary

A deserialization of untrusted data vulnerability [CWE-502] in FortiNAC may allow an unauthenticated user to execute unauthorized code or commands via specifically crafted requests to the tcp/1050 service.

Major Version Affected Products Solutions
9.4 FortiNAC version 9.4.0 through 9.4.2 Please upgrade to FortiNAC version 9.4.3 or above
9.2 FortiNAC version 9.2.0 through 9.2.7 Please upgrade to FortiNAC version 9.2.8 or above
9.1 FortiNAC version 9.1.0 through 9.1.9 Please upgrade to FortiNAC version 9.1.10 or above
7.2 FortiNAC version 7.2.0 through 7.2.1 Please upgrade to FortiNAC version 7.2.2 or above
8.8 FortiNAC 8.8 all versions Please upgrade to upper major version (check above line)
8.7 FortiNAC 8.7 all versions Please upgrade to upper major version (check above line)
8.6 FortiNAC 8.6 all versions Please upgrade to upper major version (check above line)
8.5 FortiNAC 8.5 all versions Please upgrade to upper major version (check above line)
8.3 FortiNAC 8.3 all versions Please upgrade to upper major version (check above line)
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

Acknowledgement

Fortinet is pleased to thank Florian Hauser from CODE WHITE for reporting this vulnerability under responsible disclosure.

Timeline

2023-06-19: Initial publication