Fortinet Released Security Updates to Fix 15 Vulnerabilities That Affect Multiple Products

Fortinet has released a security update with the fixes for 15 vulnerabilities that affect multiple products with distinct security issues, ranging from critical to high severity. Among the most severe issues resolved is a critical vulnerability (CVE-2024-55591) affecting FortiOS and FortiProxy. This flaw could potentially allow authentication bypass, posing a significant risk to affected systems. […] The post Fortinet Released Security Updates to Fix 15 Vulnerabilities That Affect Multiple Products appeared first on Cyber Security News.

Jan 14, 2025 - 18:35
Fortinet Released Security Updates to Fix 15 Vulnerabilities That Affect Multiple Products

Fortinet has released a security update with the fixes for 15 vulnerabilities that affect multiple products with distinct security issues, ranging from critical to high severity.

  • FortiOS
  • FortiManager
  • FortiAnalyzer
  • FortiSwitch
  • FortiProxy
  • FortiClientEMS
  • FortiWeb
  • Several other Fortinet security appliances and software

Among the most severe issues resolved is a critical vulnerability (CVE-2024-55591) affecting FortiOS and FortiProxy. This flaw could potentially allow authentication bypass, posing a significant risk to affected systems.

“An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS and FortiProxy may allow a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module”.”

Another critical vulnerability (CVE-2023-37936) in FortiSwitch products could lead to unauthenticated remote code execution due to the use of hardcoded cryptographic keys.

“An improper limitation of a pathname to a restricted directory (‘path traversal’) in Fortinet FortiManager, FortiAnalyzer 7.4.0 through 7.4.3 and 7.2.0 through 7.2.5 and 7.0.2 through 7.0.12 and 6.2.10 through 6.2.13 allows attacker to execute unauthorized code or commands via crafted HTTP or HTTPS requests.”

These issues, handled by the dedicated Fortinet Product Security Incident Response Team (PSIRT), have been addressed to ensure heightened security and stability for users.

Details of the latest advisories, including affected products, severity, and mitigation steps, are now available. Fortinet also provides resources such as its PSIRT Policy for reporting issues and an Upgrade Path Tool Table to help users update to recommended software versions.

Key Resolved Vulnerabilities

TitleCVESeverityDescriptionAffected Products
Admin Account Persistence after DeletionCVE-2024-47571HighAn operation on a resource after expiration or release vulnerability (CWE-672).FortiManager (7.4.0, 7.2.3, 7.0.8, 7.0.7, 6.4.12)
Arbitrary File Write on GUICVE-2024-36512HighA relative path traversal vulnerability (CWE-23) allowing privileged attackers to write files arbitrarily.FortiAnalyzer (7.4.x, 7.2.5), FortiManager (7.4.x, 7.2.5)
Authentication Bypass in Node.js Websocket ModuleCVE-2024-55591CriticalAuthentication bypass using an alternate path or channel (CWE-288).FortiOS (7.0.x), FortiProxy (7.2.x)
Heap Overflow in Chrome/libwebpCVE-2023-4863HighA heap overflow vulnerability in Google Chrome’s libwebp component impacting Fortinet products.FortiClientEMS, FortiClientLinux, FortiClientMac, FortiClientWindows, FortiSOAR
Command Injection in csfd DaemonCVE-2024-46662HighImproper neutralization of special elements in OS command (CWE-78).FortiManager (7.4.x), FortiManager Cloud (7.4.x)
EMS Console Login under Brute Force Attack Does Not Get LockedCVE-2024-23106HighImproper restriction of excessive authentication attempts (CWE-307).FortiClientEMS (7.2.x, 7.0.x)
Hardcoded Session Secret Leading to Remote Code ExecutionCVE-2023-37936CriticalHardcoded cryptographic key vulnerability (CWE-321).FortiSwitch (7.4.0, 7.2.x)
Missing Authentication for Managed Device ConfigurationsCVE-2024-35277HighMissing authentication for critical function vulnerability (CWE-306).FortiManager (7.4.x, 7.2.x), FortiManager Cloud (7.4.x, 7.2.x)
Multipart Form Data Denial of ServiceCVE-2024-46668HighResource allocation without limits or throttling (CWE-770).FortiOS (7.4.x)
OS Command InjectionCVE-2024-50566HighImproper neutralization of special elements in OS command (CWE-78).FortiManager (7.6.x, 7.4.x), FortiManager Cloud (7.4.x)
Out-of-Bounds Read in IPsec IKECVE-2024-46670HighOut-of-bounds read vulnerability (CWE-125).FortiOS (7.6.0, 7.4.x)
Out-of-Bounds Write in sndproxyCVE-2024-35273HighOut-of-bounds write vulnerability (CWE-787).FortiAnalyzer (7.4.x), FortiAnalyzer Cloud (7.4.x), FortiManager (7.4.x), FortiManager Cloud (7.4.x)
Path Traversal in csfd DaemonCVE-2024-48884HighImproper limitation of pathname to restricted directory (CWE-22).FortiManager (7.6.x, 7.4.x), FortiManager Cloud (7.4.x), FortiOS (7.6.x, 7.4.x), FortiProxy (7.4.x), FortiRecorder (7.2.x, 7.0.x), FortiVoice (7.0.x), FortiWeb (7.6.x, 7.4.x)
Restricted Shell Escape via Argument InjectionCVE-2023-37937HighImproper neutralization of special elements in OS command (CWE-78).FortiSwitch (7.4.0, 7.2.x)
Weak Authentication in csfd DaemonCVE-2024-48886HighWeak authentication vulnerability (CWE-1390).FortiAnalyzer (7.6.x, 7.4.x), FortiAnalyzer Cloud (7.4.x), FortiManager (7.6.x, 7.4.x), FortiManager Cloud (7.4.x), FortiOS (7.4.x), FortiProxy (7.4.x)

Recommended Actions for Users

Fortinet urges users to:

  1. Review the detailed advisories and identify affected products and versions.
  2. Upgrade to the latest recommended versions using Fortinet’s Upgrade Path Tool Table.
  3. Follow the mitigation and patching guidelines provided for each vulnerability.

Security patches and updates can be downloaded from Fortinet’s official support portal.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

The post Fortinet Released Security Updates to Fix 15 Vulnerabilities That Affect Multiple Products appeared first on Cyber Security News.