Myrmex
Myrmex
Blog/Use Cases

Security Audit on FortiGate: How to Automatically Identify Vulnerabilities

Security Audit on FortiGate: How to Automatically Identify Vulnerabilities
FortinetFORTIGATE
Myrmex

The Challenge

A production FortiGate needs to be configured following security best practices. But how do you know if the settings are adequate?

The goal was to perform a complete security audit, identifying:

  • Administrative users and password policies
  • Insecure services enabled (Telnet, HTTP)
  • Management access restrictions
  • Firmware versions and signatures

The Prompt Sent to Myrmex

Using the integration with the FortiGate, we sent:

Perform a security audit on @FGT-FIREWALL
based on best practices.

Check:
- Administrative users and passwords
- Enabled services (HTTPS, SSH, Telnet, SNMP)
- Management access (trusted hosts)
- FortiOS version and signatures
- Enabled logs

For each item: Status (Secure, Warning, Critical), current configuration, and fix command if necessary.

Note: By mentioning the device with @FGT-FIREWALL, Myrmex knows exactly which firewall to audit and executes the necessary commands.

Security Audit on FortiGate via Myrmex


What Myrmex Found

Myrmex executed a complete analysis and returned the following report:

Audit Summary

Audit ItemStatus
Adm. Users and Passwords⚠️ Warning
Enabled Services🔴 Critical
Management Access (Trusted Hosts)🔴 Critical
Version and Signatures🔴 Critical
Enabled Logs⚠️ Warning

Identified Vulnerabilities

🔴 Telnet and HTTP Enabled (Critical)

Problem: Telnet and HTTP (port 80) are enabled globally. Insecure protocols that transmit data in plain text.

Myrmex Fix:

config system global
    set admin-telnet disable
    set admin-port 8080
end

🔴 Trusted Hosts without Restriction (Critical)

Problem: trustedhost configured as 0.0.0.0/0. Administrative access allowed from any IP - exposes the firewall to brute force attacks.

Myrmex Fix:

config system admin
    edit admin
        set trusthost1 192.168.x.x 255.255.255.255
    next
end

🔴 Outdated Signatures (Critical)

Problem: FortiOS 7.6.5 (OK), but IPS (2015) and AV (2018) signatures extremely outdated. Connection to FortiGuard failing.

Myrmex Fix:

execute update-now

Note: Verify DNS/Internet connectivity to reach FortiGuard servers.

⚠️ Default Admin User (Warning)

Problem: Default user admin in use. Although a strong password policy is active, the default username is a common target for attacks.

Myrmex Fix:

config system admin
    edit new_admin
        set password <strong_password>
        set accprofile super_admin
    next
end

⚠️ Logs Only in Memory (Warning)

Problem: Log only in memory (memory) active. Logs are lost in case of reboot, hindering investigations.

Myrmex Fix:

config log syslogd setting
    set status enable
    set server <IP_SYSLOG>
end

Result

With the audit performed by Myrmex:

  • 3 critical vulnerabilities identified
  • 2 attention points mapped
  • Fix commands ready to apply
  • Next steps prioritized

Myrmex offered to investigate the communication failure with FortiGuard and apply fixes automatically.


Prompt Variations

The same type of audit can be adapted:

To check firewall policies:

Audit the firewall policies of @FGT-FIREWALL.
Identify permissive, duplicate, or unused rules.

To check VPN:

Audit the SSL VPN settings of @FGT-FIREWALL.
Check encryption, authentication, and session timeout.

For multiple devices:

Compare the security configuration between
@FGT-FIREWALL-01 and @FGT-FIREWALL-02. Show differences.

Want to identify vulnerabilities in your firewall? Try Myrmex and let AI automatically audit your infrastructure.

MYRMEX | Security Audit on FortiGate: How to Automatically Identify Vulnerabilities