Fortinet Warns of Critical RCE Flaws in FortiSandbox and FortiAuthenticator
Fortinet has issued urgent security patches for critical remote code execution (RCE) vulnerabilities impacting its FortiSandbox and FortiAuthenticator products. BleepingComputer reports that these flaws could allow unauthenticated attackers to execute arbitrary commands or code on affected systems.
The vulnerabilities are severe. For FortiAuthenticator, a heap-based buffer overflow (CVE-2024-21772) in the sslvpn daemon allows pre-authentication RCE. FortiSandbox’s issue (CVE-2024-21773) is an OS command injection in the cli component, also enabling RCE. These aren’t theoretical; they represent direct avenues for compromise.
CISOs need to understand the attacker’s calculus here: unauthenticated RCE is the holy grail. It means a direct path from network access to system control without needing credentials. These are the vulnerabilities that get weaponized fast, often before many organizations even finish patching.
What This Means For You
- If your organization uses FortiSandbox or FortiAuthenticator, you need to prioritize patching immediately. Unauthenticated RCE is a critical vector for initial access. Verify that your patching cycles are robust enough to handle zero-day-level threats like these, and audit logs for any suspicious activity around these devices prior to applying patches.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Fortinet FortiAuthenticator SSLVPN Pre-Auth RCE (CVE-2024-21772)
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| Fortinet-RCE-2024-04 | RCE | FortiSandbox |
| Fortinet-RCE-2024-04 | RCE | FortiAuthenticator |
| Fortinet-RCE-2024-04 | Command Injection | FortiSandbox |
| Fortinet-RCE-2024-04 | Command Injection | FortiAuthenticator |