Description |
This article describes the Microsoft message queuing remote code execution vulnerability assessment with FortiDAST.
CVE-2023-21554 vulnerability was discovered in the Microsoft Queuing Message Header. The vulnerability could potentially lead to unauthenticated remote code execution in the Message Queuing service due to the lack of bound checks when reading user-controlled section size. |
Scope | FortiDAST version 23.2. |
Solution |
Detection against that vulnerability is empowered by the FortiDAST Scripting Engine (FSE).
This technology enables FortiDAST to assess remotely with a high level of confidence if an asset is vulnerable to a specific vulnerability by testing the disarmed exploit against the asset itself.
To configure the scan, you will need to enable the FSE group signature 'ms-msmq' which will select the underlying script: 'CVE-2023-21554 Microsoft Message Queuing Packet Parser Remote Code Execution Vulnerability.
For reference, a step-by-step guide on how to configure FortiDAST to trigger FSE can be found on Fortinet’s blog.
For more details regarding mitigating the vulnerability by utilizing Fortinet products, refer to: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.