Multiple vulnerabilities in Fortinet FortiGate versions 4.3.13 and 5.x prior to 5.0.2 could allow an unauthenticated, remote attacker to conduct cross-site request forgery attacks on the targeted system.
The vulnerabilities are due to improper validation of certain user-supplied HTTP requests by the system/maintenance/shutdown
form. An attacker could exploit these vulnerabilities by convincing a user to visit a malicious webpage that is designed to submit malformed HTTP requests via a rebootme
action to the vulnerable form. Successful exploitation could allow an attacker to perform certain unauthorized actions such as modifying settings, policies, or restarting the device on behalf of the user.
Proof-of-concept code that exploits these vulnerabilities is publicly available.
Users should verify that unsolicited links are safe to follow.
For additional information about cross-site request forgery attacks and potential mitigation methods, see the Cisco Applied Mitigation Bulletin Understanding Cross-Site Request Forgery Threat Vectors
Administrators are advised to implement an intrusion prevention system (IPS) or intrusion detection system (IDS) to help detect and prevent attacks that attempt to exploit these vulnerabilities.
The vendor has not confirmed the vulnerabilities however software updates are available.
Users are advised to Upgrade to the latest version of Fortinet FortiGate 4.3.13 or 5.0.2 or later.