News: 0175291225

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

How WatchTowr Explored the Complexity of Vulnerability in a Secure Firewall Appliance (watchtowr.com)

(Sunday October 20, 2024 @04:58PM (EditorDavid) from the feeling-vulnerable dept.)


Cybersecurity startup Watchtowr "was founded by hacker-turned-entrepreneur Benjamin Harris," according to a [1]recent press release touting their Fortune 500 customers and $29 million investments from venture capital firms. ("If there's a way to compromise your organization, watchTowr will find it," Harris says in the announcement.)

This week they shared their own [2]research on a Fortinet FortiGate SSLVPN appliance vulnerability (discovered [3]in February by Gwendal Guégniaud of the Fortinet Product Security team — presumably in a static analysis for format string vulnerabilities). "It affected (before patching) all currently-maintained branches, and recently was highlighted by CISA as being exploited-in-the-wild... It's a Format String vulnerability [that] quickly leads to Remote Code Execution via one of many well-studied mechanisms, which we won't reproduce here..."

"Tl;dr SSLVPN appliances are still sUpEr sEcurE," their post begains — but the details are interesting. When trying to test an exploit, Watchtowr discovered instead that FortiGate always closed the connection early, thanks to an exploit mitigation in glibc "intended to hinder clean exploitation of exactly this vulnerability class." Watchtowr hoped to "use this to very easily check if a device is patched — we can simply send a %n, and if the connection aborts, the device is vulnerable. If the connection does not abort, then we know the device has been patched... " But then they discovered "Fortinet added some kind of certificate validation logic in the 7.4 series, meaning that we can't even connect to it (let alone send our payload) without being explicitly permitted by a device administrator."

> We also checked the 7.0 branch, and here we found things even more interesting, as an unpatched instance would allow us to connect with a self-signed certificate, while a patched machine requires a certificate signed by a configured CA. We did some reversing and determined that the certificate must be explicitly configured by the administrator of the device, which limits exploitation of these machines to the managing FortiManager instance (which already has superuser permissions on the device) or the other component of a high-availability pair. It is not sufficient to present a certificate signed by a public CA, for example...

>

> Fortinet's advice here is simply to update, which is always sound advice, but doesn't really communicate the nuance of this vulnerability... Assuming an organisation is unable to apply the supplied workaround, the urgency of upgrade is largely dictated by the willingness of the target to accept a self-signed certificate. Targets that will do so are open to attack by any host that can access them, while those devices that require a certificate signed by a trusted root are rendered unexploitable in all but the narrowest of cases (because the TLS/SSL ecosystem is just so solid, as we recently demonstrated)...

>

> While it's always a good idea to update to the latest version, the life of a sysadmin is filled with cost-to-benefit analysis, juggling the needs of users with their best interests.... [I]t is somewhat troubling when third parties need to reverse patches to uncover such details.

Thanks to Slashdot reader [4]Mirnotoriety for sharing the article.



[1] https://www.businesswire.com/news/home/20241010676582/en/watchTowr-Raises-19-Million-to-Redefine-External-Attack-Surface-Management-Worldwide

[2] https://labs.watchtowr.com/fortinet-fortigate-cve-2024-23113-a-super-complex-vulnerability-in-a-super-secure-appliance-in-2024/

[3] https://nvd.nist.gov/vuln/detail/CVE-2024-23113

[4] https://www.slashdot.org/~Mirnotoriety



Format string vulnerability? (Score:2)

by Pinky's Brain ( 1158667 )

Text inputs in anything should be a blob with length (printf, SQL, Shell, HTML, XML, it's all wrong).

It took decades to not get shouted down when suggesting that maybe having arbitrary pointer arithmetic in all your code wasn't a very good idea. The fundamental idiocy of control characters probably won't be widely recognized before AI takes over ... likely using exploits caused by them.

My show is on (Score:2)

by byronivs ( 1626319 )

Can I just have the tract?

Does the author not understand certificates? (Score:3)

by usedtobestine ( 7476084 )

I'm pretty sure if I sign client certificates with my internal, private, sub-CA and deliver them securely to my co-workers, I can prevent anyone without one of these certificates from connecting to my webserver or vpn concentrator. I cannot fathom how someone without a certificate issued by me would be able to connect since the CA list that my sites use to validate certificates only contains one certificate: my CA certificate.

Re: (Score:2)

by gweihir ( 88907 )

Actually, you cannot prevent connections. What you can prevent is successful TLS handshakes. That is a quite important distinction.

MS-DOS didn't get as bad as it is overnight -- it took over ten years
of careful development