Fortinet Patches Multiple Vulnerabilities Impacting FortiOS & Other Products

by Esmeralda McKenzie
Fortinet Patches Multiple Vulnerabilities Impacting FortiOS & Other Products

Fortinet Patches Multiple Vulnerabilities Impacting FortiOS & Other Products

Fortinet Patches More than one Vulnerabilities

Fortinet, a frontrunner in cybersecurity solutions, has released patches addressing several vulnerabilities affecting its FortiOS, FortiProxy, FortiPAM, FortiSwitchManager, FortiManager, and FortiAnalyzer merchandise.

If exploited, these vulnerabilities may maybe maybe maybe perhaps potentially enable unauthorized gather entry to and privilege escalation, posing a predominant possibility to affected systems.

Vulnerability Indispensable aspects

CVE-2022-45862

The graphical user interface (GUI) of FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager become once identified as having an insufficient session expiration vulnerability (CWE-613).

This flaw may maybe maybe maybe perhaps enable attackers to reuse web sessions after a user has logged out, supplied they like received the fundamental credentials.

The vulnerability has a CVSSv3 earn of three.5, indicating a medium severity stage consequently of hideous gather entry to control. Affected merchandise and their solutions encompass:

google

  • FortiOS: Variations 7.2.0 by blueprint of 7.2.5 are affected and require an toughen to 7.2.6 or above. All variations of seven.0 and 6.4 are affected and need migration to a mounted free up.
  • FortiPAM: All variations from 1.0 to 1.3 are affected and require migration to a mounted free up.
  • FortiProxy: All variations of seven.2 and 7.0 are affected and need migration to a mounted free up.
  • FortiSwitchManager: Variations 7.2.0 by blueprint of 7.2.1 are affected and is also upgraded to 7.2.2 or above.

CVE-2024-21757

An unverified password alternate vulnerability (CWE-620) become once demonstrate in FortiManager and FortiAnalyzer. This downside may maybe maybe maybe perhaps enable a be taught-write user to change admin passwords via tool configuration backup, main to doable privilege escalation.

The vulnerability carries a CVSSv3 earn of 5.5. Affected variations and solutions are:

  • FortiAnalyzer: Variations 7.4.0 by blueprint of 7.4.1 need an toughen to 7.4.2 or above, and variations 7.2.0 by blueprint of 7.2.4 must aloof be upgraded to 7.2.5 or above.
  • FortiManager: Variations 7.4.0 by blueprint of 7.4.1 require an toughen to 7.4.2 or above, and variations 7.2.0 by blueprint of 7.2.4 must aloof be upgraded to 7.2.5 or above.

CVE-2024-36505

This hideous gather entry to control vulnerability (CWE-284) in FortiOS permits an attacker with write gather entry to to bypass the file integrity checking gadget. It has a CVSSv3 earn of 4.7. The following variations are affected and require updates:

  • FortiOS: Variations 7.4.0 by blueprint of 7.4.3 must aloof be upgraded to 7.4.4 or above, variations 7.2.5 by blueprint of 7.2.7 must aloof be upgraded to 7.2.8 or above, and variations 7.0.12 by blueprint of 7.0.14 must aloof be upgraded to 7.0.15 or above.

As of now, Fortinet has now no longer disclosed any incidents where these vulnerabilities had been primitive in attacks.

Fortinet advises all users and directors to examine the fundamental updates to mitigate these vulnerabilities. The patches are needed to asserting gadget security and struggling with doable exploitation by cyber possibility actors.

googlenews

Source credit : cybersecuritynews.com

Related Posts