-
Notifications
You must be signed in to change notification settings - Fork 375
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #2545 from splunk/FortinetNAC
- Loading branch information
Showing
3 changed files
with
103 additions
and
0 deletions.
There are no files selected for viewing
67 changes: 67 additions & 0 deletions
67
detections/web/exploit_public_facing_fortinet_fortinac_cve_2022_39952.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,67 @@ | ||
name: Exploit Public-Facing Fortinet FortiNAC CVE-2022-39952 | ||
id: 2038f5c6-5aba-4221-8ae2-ca76e2ca8b97 | ||
version: 1 | ||
date: '2023-02-21' | ||
author: Michael Haag, Splunk | ||
type: TTP | ||
datamodel: | ||
- Web | ||
description: The following analytic identifies a recent CVE-2022-39952 released publicly where the URI configWizard/keyUpload.jsp recieves a POST with the payload.zip, from there the POC script will schedule a cron to run the payload and contact the remote C2. | ||
search: '| tstats count min(_time) as firstTime max(_time) | ||
as lastTime from datamodel=Web where Web.url IN ("*configWizard/keyUpload.jsp*") | ||
by Web.http_user_agent, Web.status Web.http_method, Web.url, Web.url_length, Web.src, Web.dest, sourcetype | ||
| `drop_dm_object_name("Web")` | ||
| `security_content_ctime(firstTime)` | ||
| `security_content_ctime(lastTime)` | ||
| `exploit_public_facing_fortinet_fortinac_cve_2022_39952_filter`' | ||
how_to_implement: This detection requires the Web datamodel to be populated from a | ||
supported Technology Add-On like Splunk for Apache, Splunk for Nginx, or Splunk for Palo Alto. | ||
known_false_positives: False positives may be present. Modify the query as needed to POST, or add additional filtering (based on log source). | ||
references: | ||
- https://github.com/horizon3ai/CVE-2022-39952 | ||
- https://www.horizon3.ai/fortinet-fortinac-cve-2022-39952-deep-dive-and-iocs/ | ||
- https://viz.greynoise.io/tag/fortinac-rce-attempt?days=30 | ||
tags: | ||
analytic_story: | ||
- Fortinet FortiNAC CVE-2022-39952 | ||
asset_type: Network | ||
cve: | ||
- CVE-2022-39952 | ||
cis20: | ||
- CIS 3 | ||
- CIS 5 | ||
- CIS 16 | ||
confidence: 80 | ||
context: | ||
- Scope:Inbound | ||
- Scope:Network | ||
dataset: | ||
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1190/fortigate/web_fortinetnac.log | ||
impact: 80 | ||
kill_chain_phases: | ||
- Exploitation | ||
- Installation | ||
message: Potential CVE-2022-39952 against a Fortinet NAC may be occurring against $dest$. | ||
mitre_attack_id: | ||
- T1190 | ||
nist: | ||
- DE.CM | ||
observable: | ||
- name: dest | ||
type: Hostname | ||
role: | ||
- Victim | ||
product: | ||
- Splunk Enterprise | ||
- Splunk Enterprise Security | ||
- Splunk Cloud | ||
required_fields: | ||
- Web.http_user_agent | ||
- Web.http_method | ||
- Web.url | ||
- Web.url_length | ||
- Web.src | ||
- Web.dest | ||
- sourcetype | ||
risk_score: 64 | ||
security_domain: network |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,23 @@ | ||
name: Fortinet FortiNAC CVE-2022-39952 | ||
id: 2833a527-3b7f-41af-a950-39f7bbaff819 | ||
version: 1 | ||
date: '2023-02-21' | ||
author: Michael Haag, Splunk | ||
description: On Thursday, 16 February 2022, Fortinet released a PSIRT that details CVE-2022-39952, a critical vulnerability affecting its FortiNAC product (Horizon3.ai). | ||
narrative: This vulnerability, discovered by Gwendal Guegniaud of Fortinet, allows an unauthenticated attacker to write arbitrary files on the system and as a result obtain remote code execution in the context of the root user (Horizon3.ai). | ||
Impacting FortiNAC, is tracked as CVE-2022-39952 and has a CVSS v3 score of 9.8 (critical). | ||
FortiNAC is a network access control solution that helps organizations gain real time network visibility, enforce security policies, and detect and mitigate threats. | ||
An external control of file name or path vulnerability CWE-73 in FortiNAC webserver may allow an unauthenticated attacker to perform arbitrary write on the system, reads the security advisory. | ||
references: | ||
- https://www.horizon3.ai/fortinet-fortinac-cve-2022-39952-deep-dive-and-iocs/ | ||
- https://viz.greynoise.io/tag/fortinac-rce-attempt?days=30 | ||
- https://www.bleepingcomputer.com/news/security/fortinet-fixes-critical-rce-flaws-in-fortinac-and-fortiweb/ | ||
tags: | ||
analytic_story: Fortinet FortiNAC CVE-2022-39952 | ||
category: | ||
- Adversary Tactics | ||
product: | ||
- Splunk Enterprise | ||
- Splunk Enterprise Security | ||
- Splunk Cloud | ||
usecase: Advanced Threat Detection |
13 changes: 13 additions & 0 deletions
13
tests/web/exploit_public_facing_fortinet_fortinac_cve_2022_39952.test.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,13 @@ | ||
name: Exploit Public-Facing Fortinet FortiNAC CVE-2022-39952 Unit Test | ||
tests: | ||
- name: Exploit Public-Facing Fortinet FortiNAC CVE-2022-39952 | ||
file: web/exploit_public_facing_fortinet_fortinac_cve_2022_39952.yml | ||
pass_condition: '| stats count | where count > 0' | ||
earliest_time: -24h | ||
latest_time: now | ||
attack_data: | ||
- file_name: web_fortinetnac.log | ||
data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1190/fortigate/web_fortinetnac.log | ||
source: pan:threat | ||
sourcetype: pan:threat | ||
update_timestamp: true |