Network security: Various Fortinet products vulnerable to different attacks

Important security updates have been released for FortiSandbox, FortiPortal and FortiWebManager, among others.

listen Print view
Time to update

(Image: Artur Szczybylo/Shutterstock.com)

2 min. read

Vulnerabilities in Fortinet products can serve as loopholes for attackers to compromise systems. In the worst case, malicious code can get onto computers. Admins should install the available security patches promptly.

The most dangerous are four vulnerabilities rated "high" (CVE-2024-23667, CVE-2024-23668, CVE-2024-23669, CVE-2024-23670) in different versions of FortiWebManager.

In these cases, attackers who only have read-only rights can execute their own actions via HTTP requests. The developers state that they have secured the following releases against this. Version 7.4 should not be threatened. Anyone using older versions must upgrade to a version that is still supported.

  • 6.2.5
  • 6.3.1
  • 7.0.5
  • 7.2.1

Other vulnerabilities with a"high" threat level concern FortiPortal, FortiSandbox and FortiSOAR. In these cases, attackers can bypass access control based on IP addresses or execute malicious code, among other things.

Other products such as FortiAuthenticator, FortiOS and FortiWeb are also affected. These vulnerabilities are classified as"medium". Unauthorized access can take place here.

As a list of the affected and repaired versions would go beyond the scope of this report, admins should check the points relevant to them in the security section of the Fortinet website. It is currently not known how attacks could take place in detail and whether there are already attacks. However, as Fortinet products are often used in sensitive working environments, admins should not put off patching.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.