usb drive + root credentials + fnsysctl tool can gain arbitrary code execution.
Summary
An admin user with super_admin privileges can execute an arbitrary binary contained on an USB drive plugged to a FortiGate, via linking the aforementioned binary to a command that is allowed to be run by the fnsysctl CLI command.
Affected Products
FortiOS 5.6.0 to 5.6.2
FortiOS 5.4.0 to 5.4.8
FortiOS 5.2 and below.
Solutions
Upgrade to 5.6.3 or 5.4.9 or newer versions Workarounds: * Switching to FIPS mode will ban the fnsysctl CLI command hence preventing the attack. * Only the super_admin profile has the privileges required to perform the attack, so avoid assigning it to administrators.