• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Exploit released for critical Fortinet RCE flaws, patch now

Bill Toulas by Bill Toulas
February 21, 2023
Reading Time: 2 mins read
0
Exploit released for critical Fortinet RCE flaws, patch now

Exploit released for critical Fortinet RCE flaws, patch now

RELATED POSTS

DISH slapped with multiple lawsuits after ransomware cyber attack

Twitter open-sources recommendation algorithm code

15 million public-facing services vulnerable to CISA KEV flaws

Security researchers have released a proof-of-concept exploit for a critical-severity vulnerability (CVE-2022-39952) in Fortinet’s FortiNAC network access control suite.

Fortinet disclosed the security issue on February 16 and calculated a severity score of 9.8. The vendor warned that it could be leveraged by an unauthenticated attacker to write arbitrary files on the system and achieve remote code execution with the highest privileges.

Organizations using FortiNAC 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, and all versions on the 8.8, 8.7, 8.6, 8.5, and 8.3 branches were urged prioritize applying the available security updates.

Today, the researchers at Horizon3 cybersecurity company published a technical post detailing the vulnerability and how it can be exploited. Proof-of-concept (PoC) exploit code is also available from the company’s repository on GitHub.

Attacking FortiNAC

The released PoC involves writing a cron job to /etc/cron.d/ that triggers every minute to initiate a root reverse shell to the attacker, giving them remote code execution capabilities.

The analysts discovered that the fix for CVE-2022-39952 removed ‘keyUpload.jsp,’ an endpoint that parses requests for a ‘key’ parameter, writes it on a config file, and then executes a bash script, ‘configApplianceXml.’

Buy JNews
ADVERTISEMENT
Comparison between vulnerable and patched version
Comparison between vulnerable and patched versions (Horizon3)

The bash script executes the ‘unzip’ command on the newly written file, but just before that, the script calls “cd /.”

The executed bash script
The executed bash script (Horizon3)

“Unzip will allow placing files in any paths as long as they do not traverse above the current working directory,” Horizon3 explains.

“Because the working directory is /, the call unzip inside the bash script allows any arbitrary file to be written,” the researchers added.

Hence, an attacker can create a ZIP archive that contains the payload, specifying where it must be extracted, and then send it to the vulnerable endpoint using the key parameter. Horizon3 says the reverse shell should be ready within a minute.

The ‘key’ parameter ensures that the malicious request will reach ‘keyUpload.jsp,’ which is the unauthenticated endpoint that Fortinet removed in the fixed versions of FortiNAC.

Horizon's proof of concept exploit
Executing the PoC exploit (Horizon3)

The code from Horizon3 automates this process and could be picked up and modified by threat actors into a weaponized exploit. It can also help defenders build appropriate protection against exploitation attempts on corporate networks.  

FortiNAC administrators are strongly recommended to immediately upgrade to a version of the product that is not affected by the CVE-2022-39952 vulnerability., specifically FortiNAC 9.4.1 or later, 9.2.6 or above, 9.1.8 or newer, and 7.2.0 or later.

Share54Tweet34Pin12
Bill Toulas

Bill Toulas

Related Posts

Dish Network confirms ransomware attack behind multi-day outage
Cyber Security

DISH slapped with multiple lawsuits after ransomware cyber attack

April 1, 2023
Twitter open-sources recommendation algorithm code
Cyber Security

Twitter open-sources recommendation algorithm code

March 31, 2023
Antivirus and EDR solutions tricked into acting as data wipers
Cyber Security

15 million public-facing services vulnerable to CISA KEV flaws

March 31, 2023
New GoTrim botnet brute forces WordPress site admin accounts
Cyber Security

Hackers exploit bug in Elementor Pro WordPress plugin with 11M installs

March 31, 2023
10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack
Cyber Security

10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack

March 31, 2023
10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack
Cyber Security

10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack

March 31, 2023

Recommended Stories

Why BTC outflows persist despite renewed hopes for crypto comeback

Why BTC outflows persist despite renewed hopes for crypto comeback

March 21, 2023
Bloxmith launches Raiders Rumble: A mobile strategy game for Web2 and Web3

Bloxmith launches Raiders Rumble: A mobile strategy game for Web2 and Web3

March 13, 2023
GTA Online bug exploited to ban, corrupt players’ accounts

GTA Online bug exploited to ban, corrupt players’ accounts

January 23, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • Bing Chat’s secret modes turn it into a personal assistant or friend

    136 shares
    Share 54 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
  • RedEyes hackers use new malware to steal data from Windows, phones

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • Toncoin [TON] climbs into resistance zone, but momentum favored the bulls
  • The Sandbox [SAND] deserted by users? How NFTs and prices closed Q1
  • DISH slapped with multiple lawsuits after ransomware cyber attack

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?