Finding Fortinet web application firewall devices with Rumble

August 25, 2021, by

Pearce Barry

Recently published security research from Rapid7 provides details on an OS command injection vulnerability in Fortinet’s web application firewall (WAF) product line known as FortiWeb. This vulnerability exists in the FortiWeb management interface (versions 6.3.11 and prior) and has a CVSSv3 base score of 8.7 (currently awaiting CVE assignment). While authentication is required for successful exploitation of this vulnerability, Rapid7 researchers point out that chaining this with exploitation of an existing authentication bypass vulnerability could be a successful attack vector against vulnerable FortiWeb targets.

Fortinet is tracking this issue as FG-IR-21-116 (with a fix in the upcoming FortiWeb 6.4.1 release) and advising current FortiWeb owners with a workaround until the patch is available.

Finding Fortinet web application firewall devices with Rumble

From the Services inventory, use the following pre-built query to locate FortiWeb assets in your network:

os:fortinet AND (tls.names:="FWB%" OR (tls.names:="FV%" AND NOT tls.names:="FVE%" AND NOT tls.names:="FVC%"))
Find fortinet devices

As always, any prebuilt queries we create are available from our Queries Library. Check out the library for other useful inventory queries.

Try Rumble

Don’t have Rumble and need help finding your FortiWeb assets? Start your Rumble trial today.

Similar Content

September 9, 2021

Finding Confluence servers with Rumble

The U.S. Cyber Command recently reported “mass exploitation” of a code execution vulnerability in Atlassian’s popular Confluence software (CVE-2021-26084). This vulnerability has a CVSS Base score of 9.8 (considered “critical”), requires no authentication for exploitation, …

Read More

July 15, 2021

How to find SolarWinds Serv-U systems on your network

Microsoft recently notified SolarWinds that they had discovered a remote code execution vulnerability in Serv-U Managed File Transfer and Serv-U Secure FTP. The vulnerability being exploited is CVE-2021-35211 and only exists when SSH is enabled in Serv-U environments. …

Read More

May 4, 2021

How to find Exim mail servers on your network

In their security advisory for 21Nails, the Qualys Research team communicated their discovery of several critical vulnerabilities in Exim mail servers that can be exploited for unauthenticated code execution and root privileges. Recently, maintainers of the Exim mail server …

Read More