Network security: Various Fortinet products vulnerable to different attacks
Important security updates have been released for FortiSandbox, FortiPortal and FortiWebManager, among others.
(Image: Artur Szczybylo/Shutterstock.com)
Vulnerabilities in Fortinet products can serve as loopholes for attackers to compromise systems. In the worst case, malicious code can get onto computers. Admins should install the available security patches promptly.
Several loopholes closed
The most dangerous are four vulnerabilities rated "high" (CVE-2024-23667, CVE-2024-23668, CVE-2024-23669, CVE-2024-23670) in different versions of FortiWebManager.
In these cases, attackers who only have read-only rights can execute their own actions via HTTP requests. The developers state that they have secured the following releases against this. Version 7.4 should not be threatened. Anyone using older versions must upgrade to a version that is still supported.
- 6.2.5
- 6.3.1
- 7.0.5
- 7.2.1
Malicious code attacks possible
Other vulnerabilities with a"high" threat level concern FortiPortal, FortiSandbox and FortiSOAR. In these cases, attackers can bypass access control based on IP addresses or execute malicious code, among other things.
Other products such as FortiAuthenticator, FortiOS and FortiWeb are also affected. These vulnerabilities are classified as"medium". Unauthorized access can take place here.
As a list of the affected and repaired versions would go beyond the scope of this report, admins should check the points relevant to them in the security section of the Fortinet website. It is currently not known how attacks could take place in detail and whether there are already attacks. However, as Fortinet products are often used in sensitive working environments, admins should not put off patching.
(des)