Firewall session injection in FGSP

Summary

An improper restriction of communication channel to intended endpoints vulnerability [CWE-923] in FortiOS may allow an unauthenticated attacker to inject unauthorized sessions via crafted FGSP session synchronization packets.

Version Affected Solution
FortiOS 7.6 7.6.0 Upgrade to 7.6.1 or above
FortiOS 7.4 7.4.0 through 7.4.5 Upgrade to 7.4.6 or above
FortiOS 7.2 7.2 all versions Migrate to a fixed release
FortiOS 7.0 7.0 all versions Migrate to a fixed release
FortiOS 6.4 6.4 all versions Migrate to a fixed release
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

Workaround

Create local-in policies for restricting the access to port 708 only on FGSP session synchronization interface and to peers IP:

config firewall service custom
edit "FGSP"
set udp-portrange 708
next
end

config firewall addrgrp
edit "FGSP_Peer_IPs"
set member "my_allowed_addresses"
end

config firewall local-in-policy
edit 1
set intf
set srcaddr "FGSP_Peer_IPs"
set dstaddr "all"
set action accept
set service "FGSP"
set schedule "always"
next
edit 2
set intf "any"
set srcaddr "all"
set dstaddr "all"
set action deny
set service "FGSP"
set schedule "always"
next
end

Acknowledgement

Internally discovered and reported by Greg Foletta of the Fortinet team.

Timeline

2025-06-10: Initial publication