Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762# CVE-2024-21762 Check
Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762. For more information, see [this Bishop Fox blog post](https://bishopfox.com/blog/cve-2024-21762-vulnerability-scanner-for-fortigate-firewalls)
## Usage
```
python3 check-cve-2024-21762.py <host> <port>
```
In most cases, the script will either output "Vulnerable" or "Patched". It performs minimal verification that the target is in fact a FortiOS SSL VPN, and in some cases it will print a warning before providing output. If this happens, double check that your target is a FortiOS SSL VPN interface and not a management interface.
```
# Testing against the SSL-VPN interface
$ python3 check-cve-2024-21762.py 192.168.250.124 12443
Vulnerable
# Testing against the management interface -> bogus results
$ python3 check-cve-2024-21762.py 192.168.250.124 443
[warning] Server does not look like a Fortinet SSL VPN interface
Patched
```
[4.0K] /data/pocs/6c1dc9c0ec4a15dbc4ef2dabe9b71d4af7624b66
├── [1.4K] check-cve-2024-21762.py
├── [ 34K] LICENSE
└── [ 937] README.md
0 directories, 3 files