CVE-2023-48788
Fortinet FortiClient EMS SQL Injection Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
YesDecision
Descriptions
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.
Una neutralización inadecuada de elementos especiales utilizados en un comando sql ("inyección sql") en Fortinet FortiClientEMS versión 7.2.0 a 7.2.2, FortiClientEMS 7.0.1 a 7.0.10 permite a un atacante ejecutar código o comandos no autorizados a través de paquetes especialmente manipulados.
A remote SQL injection vulnerability exists in FortiNet FortiClient EMS (Endpoint Management Server) versions 7.2.0 through 7.2.2 and 7.0.1 through 7.0.10. FortiClient EMS serves as an endpoint management solution tailored for enterprises, offering a centralized platform for overseeing enrolled endpoints. The SQL injection vulnerability is due to user controller strings which can be sent directly into database queries. FcmDaemon.exe is the main service responsible for communicating with enrolled clients. By default it listens on port 8013 and communicates with FCTDas.exe which is responsible for translating requests and sending them to the database. In the message header of a specific request sent between the two services, the FCTUID parameter is vulnerable to SQL injection. It can be used to enable the xp_cmdshell which can then be used to obtain unauthenticated remote code execution in the context of NT AUTHORITY\SYSTEM. Upgrading to either 7.2.3, 7.0.11 or above is recommended by FortiNet. It should be noted that in order to be vulnerable, at least one endpoint needs to be enrolled / managed by FortiClient EMS for the necessary vulnerable services to be available.
Fortinet FortiClient EMS contains a SQL injection vulnerability that allows an unauthenticated attacker to execute commands as SYSTEM via specifically crafted requests.
CVSS Scores
SSVC
- Decision:Act
Timeline
- 2023-11-19 CVE Reserved
- 2024-03-12 CVE Published
- 2024-03-20 First Exploit
- 2024-03-25 Exploited in Wild
- 2024-04-15 KEV Due Date
- 2024-05-24 EPSS Updated
- 2024-08-16 CVE Updated
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/horizon3ai/CVE-2023-48788 | 2024-03-20 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://fortiguard.com/psirt/FG-IR-24-007 | 2024-05-23 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fortinet Search vendor "Fortinet" | Forticlient Enterprise Management Server Search vendor "Fortinet" for product "Forticlient Enterprise Management Server" | >= 7.0.1 <= 7.0.10 Search vendor "Fortinet" for product "Forticlient Enterprise Management Server" and version " >= 7.0.1 <= 7.0.10" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Forticlient Enterprise Management Server Search vendor "Fortinet" for product "Forticlient Enterprise Management Server" | >= 7.2.0 <= 7.2.2 Search vendor "Fortinet" for product "Forticlient Enterprise Management Server" and version " >= 7.2.0 <= 7.2.2" | - |
Affected
|