First published: Tue Mar 12 2024(Updated: )
An out-of-bounds write vulnerability [CWE-787] and a Stack-based Buffer Overflow [CWE-121] in FortiOS & FortiProxy captive portal may allow an inside attacker who has access to captive portal to execute arbitrary code or commands via specially crafted HTTP requests.## Workaround:Set a non form-based authentication scheme:<br/>config authentication scheme<br/>edit scheme<br/>set method method<br/>next<br/>end<br/>Where <method> can be any of those :ntlm NTLM authentication.basic Basic HTTP authentication.digest Digest HTTP authentication.negotiate Negotiate authentication.fsso Fortinet Single Sign-On (FSSO) authentication.rsso RADIUS Single Sign-On (RSSO) authentication.ssh-publickey Public key based SSH authentication.cert Client certificate authentication.saml SAML authenticationNone of the enabled authentication schemes should be form-based.Please note that only devices with captive portal enabled are affected.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | ||
Fortinet FortiProxy | ||
Fortinet FortiOS | >=7.4.0<=7.4.1 | |
Fortinet FortiOS | >=7.2.0<=7.2.5 | |
Fortinet FortiOS | >=7.0.0<=7.0.12 | |
Fortinet FortiOS | >=6.4.0<=6.4.14 | |
Fortinet FortiOS | >=6.2.0<=6.2.15 | |
Fortinet FortiProxy | =. | |
Fortinet FortiProxy | >=7.2.0<=7.2.6 | |
Fortinet FortiProxy | >=7.0.0<=7.0.12 | |
Fortinet FortiProxy | >=2.0.0<=2.0.13 | |
Fortinet FortiSASE | =3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.