Hi
I have a pair of FortiGate-200E Firewalls in HA mode
v6.2.9,build1234,210601 (GA)
The advisory FG-IR-22-398 recommends checking for the existence of certain files in the filesystem.
/data/lib/libips.bak
/data/lib/libgif.so
/data/lib/libiptcp.so
/data/lib/libipudp.so
/data/lib/libjepg.so
/var/.sslvpnconfigbk
/data/etc/wxd.conf
/flash
The fnsysctl command doesn't appear to be available.
$ fnsysctl ls
Unknown action 0
How do I list files in the filesystem in v6.2.9?
Do I need to enter a privileged mode to use fnsysctl or should I be using another command?
I am new to Fortigates and this has just been dropped in my lap.
Thanks for any assistance.
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi,
Hi,
Thanks, someone downgraded the account call superadmin to the prof_admin profile:)
There is one account on the firewall with the super_admin profile. Hopefully I can track those account details down. A challenge for tomorrow.
Hi,
is there any workaround other than disable SSLVPN? E.g. connection restrictions only some countrie?
Thanks.
Jirka
We have generally only those countries allowed for SSL VPN, that are also needed by travelling users or home users.
Nope, or upgrade the firmware or disable SSL. Many restrict SSL VPN access to their country, which is good practice always, but this only reduces the exposure. This exploit is not trivial to create, so those who can develop it, I am sure, will have advance infrastructure capabilities as well. Everyone can buy 200-countries VPN, VPS server in any country with crypto coins, etc.
I think the same PSIRT also mentiones to search for the logfiles for
Logdesc="Application crashed" and msg="[...] application:sslvpnd,[...], Signal 11 received, Backtrace: [...]“
How can this be done easily on the CLI?
Dan
I have the same question as Dan.
And I also wonder the path to the logfile to search and the name of the logfile.
\\eda
We use FAZ, but check here for CLI commands
https://community.fortinet.com/t5/FortiGate/Technical-Tip-Displaying-logs-via-FortiGate-s-CLI/ta-p/1...
Yes, @JoePasc , I have tried this path too. But I was not able to identify the right filter and the right log to search in. Would be nice to just grep for a string across all logs..
Would you mind sharing with us the exact CLI commands that would reveal the "bad" entries, if they exist?
Thanks
Dan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1661 | |
1077 | |
752 | |
443 | |
220 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.