This is regarding the Advanced Notice: FG-IR-22-377: Critical Severity FortiOS /FortiProxy- Authentication bypass on administrative interface.
I want to configure the workaround to apply a firewall policy to local-in traffic to restrict, please see Customer Support Bulletin CSB-221006-1
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
does the vulnerability also apply if the HTTPS admin port has only specific WAN IP's whitelisted for admin access ?
We were wondering the same thing and found that in version 7.0 the FortiGate does not respond to requests (SYN packet is not answered).
Prerequisite is that all "Trusted Hosts" are set!
In version 7.2 the behavior is different. There the Web GUI answers also if all "Trusted Hosts" are set. There it is mandatory to work with loca-in policies.
ah just found the work-around, apply a IP whitelist and you should be fine
Is there a CVE for this vulnerability?
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1714 | |
1093 | |
752 | |
447 | |
232 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.