CVE-2023-36554
Fortinet FortiManager vulnerability analysis and mitigation

Overview

A critical improper access control vulnerability (CVE-2023-36554) was discovered in Fortinet FortiManager's FortiWLM MEA component. The vulnerability affects multiple versions including FortiManager 7.4.0, versions 7.2.0 through 7.2.3, versions 7.0.0 through 7.0.10, versions 6.4.0 through 6.4.13, and all versions of 6.2. The issue was internally discovered by Gwendal Guégniaud of Fortinet Product Security team and was publicly disclosed on March 12, 2024 (Fortinet Advisory).

Technical details

The vulnerability is classified as an improper access control issue (CWE-284) that exists in the FortiWLM MEA component of FortiManager. The vulnerability received a CVSS v3.1 base score of 9.8 (Critical) from NVD and 8.1 (High) from Fortinet. The vulnerability allows an unauthenticated remote attacker to execute unauthorized code or commands through specially crafted HTTP requests. It's important to note that FortiWLM MEA is not installed by default on FortiManager (NVD, Fortinet Advisory).

Impact

If exploited, this vulnerability allows attackers to execute unauthorized code or commands on affected FortiManager systems. Given the critical CVSS score and the authentication bypass nature of the vulnerability, successful exploitation could lead to complete system compromise (NVD).

Mitigation and workarounds

Fortinet has released patches for all affected versions. Users are advised to upgrade to the following versions: FortiManager 7.4.1 or above for 7.4.x, 7.2.4 or above for 7.2.x, 7.0.11 or above for 7.0.x, and 6.4.14 or above for 6.4.x. Users of version 6.2 should migrate to a fixed release. As a temporary workaround, since FortiWLM MEA is not installed by default, administrators can disable this component if immediate patching is not possible (Fortinet Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management