FortiJump, identified as CVE-2024-47575, is a significant vulnerability in Fortinet's FortiManager software. The flaw, which has a CVSS v4 score of 9.8, was first exploited in zero-day attacks starting from June 2024, impacting over 50 servers according to a report by Mandiant. The vulnerability results from missing authentication for a critical function in the FortiManager fgfmd daemon, enabling a remote unauthenticated attacker to execute arbitrary code or commands via specially crafted requests. Fortinet attempted to privately disclose this vulnerability to their customers and provided mitigation strategies around October 15, but it was later revealed that state-sponsored actors had already been exploiting this flaw in espionage attacks.
Further investigation into the vulnerability led to the discovery of a similar exploit known as "FortiJump Higher." This new vulnerability was found by the security research team at watchTowr while trying to reproduce a FortiJump exploit in their lab. They reported that FortiJump Higher could be used to escalate privileges from a managed FortiGate appliance to the central FortiManager appliance. Additionally, they found two file overwrite vulnerabilities that could potentially crash the system. Alarmingly, these vulnerabilities were found to remain effective even in patched versions of the software.
Despite Fortinet's efforts to patch the original FortiJump vulnerability, researchers have claimed that the patch is not entirely effective against all exploit methods. This leaves systems still vulnerable to these sophisticated attacks. The continuous exploitation of these vulnerabilities underscores the need for organizations to take immediate action to secure their systems and protect their data. As the situation continues to evolve, it is crucial for Fortinet and other cybersecurity firms to continuously monitor and address these threats to ensure the safety of their users.
Description last updated: 2024-11-15T16:15:57.422Z