CVE-2024-47575 (“FortiJump”): FortiManager Missing Authentication RCE Added to KEV After In-the-Wild Exploitation

1. Executive Summary

CVE-2024-47575 is a critical “missing authentication for a critical function” vulnerability (CWE-306) in Fortinet FortiManager and FortiManager Cloud that can enable unauthenticated remote attackers to execute arbitrary code or commands via specially crafted requests. Fortinet and multiple incident-response partners reported in-the-wild exploitation, and the vulnerability is flagged in NVD as present in CISA’s Known Exploited Vulnerabilities (KEV) catalogue. NVD lists a CVSS v3.1 base score of 9.8 (Critical). Mandiant’s investigation documented exploitation activity dating back to June 2024 and tracked the activity as UNC5820, including evidence of staging/exfiltration of FortiGate configuration data from compromised FortiManager instances. See Mandiant’s investigation.

2. Contextual Background

2.1 Nature of the threat

Vulnerability: Missing authentication for a critical function in the FortiManager fgfmd daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands.

Affected versions (per NVD description): FortiManager 7.6.0; 7.4.0–7.4.4; 7.2.0–7.2.7; 7.0.0–7.0.12; 6.4.0–6.4.14; 6.2.0–6.2.12; plus multiple FortiManager Cloud version ranges. Refer to NVD and the Fortinet PSIRT advisory for the definitive, current fixed-version guidance.

2.2 Threat-actor attribution

Attribution: UNC5820 (tracked by Mandiant). Confidence: Likely (based on Mandiant’s direct investigative findings and artefact correlation). Mandiant notes it lacked sufficient data at publication time to assess actor motivation or location. Source: Mandiant’s investigation.

2.3 Sector and geographic targeting

Mandiant observed exploitation across 50+ potentially compromised FortiManager devices spanning “various industries”. No single sector focus was confirmed in Mandiant’s public write-up. Source: Mandiant’s investigation.

Important nuance on “100,000 devices”: Some reporting references that a single FortiManager can manage up to ~100,000 devices, which amplifies downstream risk if a management plane is compromised. This is capacity context rather than a verified count of exposed/vulnerable FortiManager instances on the internet. See: Dark Reading coverage.

3. Technical Analysis

3.1 Vulnerability mechanics and observed TTPs

CVE-2024-47575 stems from missing authentication in a “critical function” within the FortiManager fgfmd daemon, enabling unauthenticated remote code execution / command execution via crafted requests. Source: NVD, and corroborated in incident-response reporting such as Rapid7’s analysis.

Observed behaviours (Mandiant):

  • Creation/modification of an archive file used to stage sensitive configuration data (notably /tmp/.tm). Source: Mandiant’s investigation.
  • Outbound network activity shortly after archive creation, consistent with exfiltration timing. Source: Mandiant’s investigation.
  • Registration of an unauthorised Fortinet device (serial FMG-VMTM23017412) and artefacts written to /fds/data/unreg_devices.txt. Source: Mandiant’s investigation.

MITRE ATT&CK technique mapping (representative):

  • Remote Services / exploitation for initial access: T1190
  • Command execution: T1059
  • Archive collected data: T1560
  • Exfiltration over C2 channel / HTTPS-style egress: T1041
  • Credential access via configuration/hashed password material: T1552

3.2 Exploitation status

Exploited in the wild: Fortinet reported exploitation; Rapid7 and national bodies (UK) amplified the urgency and recommended compromise assessments aligned to vendor IOCs. See: Rapid7, UK NCSC advisory, and NVD (which flags KEV inclusion).

KEV status: NVD explicitly states this CVE is in CISA’s Known Exploited Vulnerabilities catalogue and records a “date added” of 23 October 2024 and federal remediation due date of 13 November 2024. Source: NVD.

4. Impact Assessment

4.1 Severity and scope

Severity: CVSS v3.1 base score 9.8 (Critical) (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) per Fortinet CNA data shown in NVD. Source: NVD.

Business impact: Successful exploitation may enable adversaries to extract sensitive network configurations, device inventories, and credential material (including hashed passwords), increasing the likelihood of follow-on compromise of managed Fortinet devices and wider enterprise access. Source: Mandiant’s investigation.

4.2 Victim profile

Victims include organisations operating FortiManager (or FortiManager Cloud) exposed such that an attacker can reach the management plane. Mandiant’s public reporting references multiple industries and 50+ potentially compromised FortiManager devices. Source: Mandiant’s investigation.

5. Indicators of Compromise (IOCs)

5.1 IOC table

Note: The following IOCs are drawn from Mandiant’s public investigation. Validate against your environment context before blocking, and prefer detection + scoping over broad deny-listing if you have legitimate dependencies that overlap.

TypeValueContext / NotesSource
IP address45.32.41.202UNC5820-associated infrastructure (observed in exploitation artefacts)Mandiant investigation
IP address104.238.141.143UNC5820-associated infrastructureMandiant investigation
IP address158.247.199.37UNC5820-associated infrastructureMandiant investigation
IP address195.85.114.78UNC5820-associated infrastructure (observed outbound traffic to :443 after archive events)Mandiant investigation
File / path/tmp/.tmArchive used to stage configuration dataMandiant investigation
Serial numberFMG-VMTM23017412Unauthorised Fortinet device ID observed after exploitationMandiant investigation
File / path/fds/data/unreg_devices.txtContains unauthorised device serial + IP pairMandiant investigation
Hash (MD5)9DCFAB171580B52DEAE8703157012674MD5 hash of unreg_devices.txt (as published)Mandiant investigation
Log keywordmsg=”Unregistered device localhost add succeeded”String indicating exploitation in /log/locallog/elogMandiant investigation
Log keywordchanges=”Edited device settings (SN FMG-VMTM23017412)”String indicating exploitation in /log/locallog/elogMandiant investigation
Log keywordchanges=”Added unregistered device to unregistered table.”String indicating exploitation in /log/locallog/elogMandiant investigation
Email[email protected]Disposable email address observed in subscription artefactsMandiant investigation
KeywordPurity SupremeCompany name string observed in artefactsMandiant investigation

5.2 Detection guidance

  • High-fidelity hunting: Search for the malicious device ID FMG-VMTM23017412 and “Unregistered device” log strings in FortiManager logs (e.g., /log/locallog/elog). Source: Mandiant investigation.
  • File-system artefacts: Investigate unexpected creation/modification of /tmp/.tm and presence/changes to /fds/data/unreg_devices.txt. Source: Mandiant investigation.
  • Network analytics: Look for outbound connections to the published IOC IPs shortly after suspicious archive activity; prioritise egress to 443 where byte counts align with staged archive sizes. Source: Mandiant investigation.
  • Rule content: Mandiant notes YARA-L rules released via Google SecOps Enterprise+ “Mandiant Intel Emerging Threats” pack (rule names include “Suspicious FortiManager Inbound and Outbound Connection”). Source: Mandiant investigation.

6. Incident Response Guidance

6.1 Containment, eradication, and recovery

  • Immediate containment: If FortiManager is internet-exposed, restrict management-plane access to known administrator IP ranges and required device subnets only, and disable unnecessary services until patched. Align actions to Fortinet PSIRT guidance and national advisories such as UK NCSC.
  • Patch / upgrade: Apply Fortinet’s fixed versions and follow workaround guidance where upgrades are not immediately possible. Reference: Fortinet PSIRT advisory and confirmation in Rapid7’s write-up.
  • Recovery approach: National guidance recommends a compromise assessment using vendor IOCs and, if compromised, rebuilding/re-initialising FortiManager and restoring from a known-good backup (pre-compromise) where possible. See NHS England alert.

6.2 Forensic artefacts to collect

  • FortiManager logs (especially local event logs referenced by Mandiant), and audit trails covering device add/modify operations.
  • File-system artefacts: /tmp/.tm, /fds/data/unreg_devices.txt, and related subscription files referenced in public reporting.
  • Network telemetry: north-south connections to/from the FortiManager management plane; egress flows from FortiManager to the IOC IPs.

6.3 Lessons learned

  • Do not expose management planes to the internet unless strictly required; enforce IP allow-listing and strong segmentation.
  • Baseline “rare” management operations (device registration, unregistered-device handling) so anomalies alert quickly.

7. Threat Intelligence Contextualisation

7.1 Similar incident patterns

Fortinet management-plane exploitation continues to be attractive because it centralises credentials, topology, and policy control for downstream security infrastructure. In this case, Mandiant observed theft of managed-device configuration and hashed password material—an approach that can enable rapid follow-on access if not contained. Source: Mandiant investigation.

7.2 Full MITRE ATT&CK mapping

TacticTechnique IDTechnique NameObserved Behaviour
Initial AccessT1190Exploit Public-Facing ApplicationUnauthenticated exploitation of FortiManager service to enable code/command execution (as described in public reporting).
ExecutionT1059Command and Scripting InterpreterArbitrary command execution capability implied by vulnerability impact (RCE/ACE).
CollectionT1005Data from Local SystemCollection of configuration data and sensitive files from FortiManager.
CollectionT1552Unsecured CredentialsExfiltration of configuration data containing hashed passwords and credential material for managed devices.
CollectionT1560Archive Collected DataCreation/use of /tmp/.tm archive to stage sensitive content.
ExfiltrationT1041Exfiltration Over C2 ChannelOutbound traffic observed shortly after archive activity to external IPs.

8. Mitigation Recommendations

8.1 Hardening and configuration

  • Restrict FortiManager management access to a tightly controlled admin network (VPN + allow-listing), and avoid direct internet exposure where feasible. Align with UK NCSC guidance.
  • Implement egress controls for management infrastructure; alert on new or unusual outbound destinations from FortiManager.
  • Enable centralised logging and long retention for FortiManager audit logs and device registration activity.

8.2 Patch management and prioritisation

  • Prioritise emergency patching due to (a) critical severity and (b) in-the-wild exploitation. Sources: NVD, Rapid7.
  • Where patching is delayed, apply vendor workarounds and enforce strict network controls as compensating measures. Source: Fortinet PSIRT advisory.

9. Historical Context & Related Vulnerabilities

Fortinet products are frequently targeted due to their perimeter and management roles; incident responders and national agencies routinely stress rapid patch adoption and management-plane isolation when Fortinet advisories indicate exploitation. For this specific incident and its exploitation timeline (June–September 2024 observations), see: Mandiant’s investigation.

10. Future Outlook

  • Expect continued scanning and opportunistic exploitation of internet-exposed FortiManager systems, especially where patch adoption lags.
  • Downstream targeting risk (managed FortiGate and related infrastructure) remains a key concern if attackers leverage exfiltrated configuration and credential material for follow-on access. Source: Mandiant’s investigation.

11. Further Reading