OS Command Injection

Summary

An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] in FortiManager may allow an authenticated remote attacker to execute unauthorized code via FGFM crafted requests.

Version Affected Solution
FortiManager Cloud 7.6 7.6.0 through 7.6.1 Upgrade to 7.6.2 or above
FortiManager Cloud 7.4 7.4.0 through 7.4.4 Upgrade to 7.4.5 or above
FortiManager Cloud 7.2 7.2.2 through 7.2.7 Upgrade to 7.2.8 or above
FortiManager 7.6 7.6.0 through 7.6.1 Upgrade to 7.6.2 or above
FortiManager 7.4 7.4.0 through 7.4.5 Upgrade to 7.4.6 or above
FortiManager 7.2 7.2.1 through 7.2.8 Upgrade to 7.2.9 or above
FortiManager 7.0 Not affected Not Applicable

This vulnerability was publiclly disclosed by Watchtowr, without following industry standard responsible disclosure process, and advertised via their X account.

Please Note: This vulnerability does not enable an attacker to use an unauthorized device to exploit FortiManager instances, and does not bypass or negate the patch deployed for FG-IR-24-423.

To exploit this vulnerability, an attacker needs to be in possession of the local certificate and private key of a FortiGate registered and authorised to the targeted FortiManager. In regular conditions, those cannot be extracted, even by a FortiGate's admin.

Note that to the best of our knowledge, this vulnerability has not been observed to be exploited in the wild.

Timeline

2025-01-14: Initial publication