Fortinet plugs security holes in several products

Fortinet has released security updates for various products. Attackers can use these to infiltrate malicious code, for example.

Save to Pocket listen Print view
Stylized graphic: Burning appliances in the network

(Image: Bild erstellt mit KI in Bing Designer durch heise online / dmk)

3 min. read

Fortinet has released security updates for numerous products. One of the vulnerabilities is considered a critical risk, while two others have a "high" threat level.

The most serious is a security gap in Fortiswitches, which allows attackers to change admin passwords with specially prepared requests from the network without authentication (CVE-2024-48887, CVSS 9.3, risk "critical"). The gap is closed by software versions 6.4.15, 7.0.11, 7.2.9, 7.4.5 or 7.6.1 and newer.

In addition, there are insufficient restrictions on desired endpoints in communication channels. This allows attackers in a man-in-the-middle position to impersonate the management interface by intercepting FGFM authentication requests between the actual endpoints. This affects FortiOS, Fortiproxy, Fortimanager, Fortianalyzer, Fortivoice and Fortiweb (CVE-2024-26013, CVE-2024-50565, both CVSS 7.1, risk "high"). In Fortiisolator, attackers with a "super admin" profile and access to the command line can inject code via specially prepared HTTP requests and execute it without authorization, which is due to insufficient filtering of elements (CVE-2024-54024, CVSS 7.0, risk "high").

IT managers should check the new security notifications and download and install the available updates for instances used in their networks or, if necessary, implement the temporary countermeasures available in some cases until an update is possible.

Cybercriminals regularly attack security vulnerabilities in Fortinet devices, as these usually allow access to networks. Admins should therefore not hesitate for long, but install the updates quickly.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.