CISA and Fortinet Warns of New Critical FortiOS ZeroDay Flaws

pFortinet has classified both security vulnerabilities as critical Additionally CISA has updated its Known Exploited Vulnerabilities KEV Catalog with pertinent details regarding the issueppNetwork security vendor Fortinet has released security updates to address remote code execution vulnerabilities CVE202421762 CVE202423313 in FortiOS The vulnerabilities could be exploited by cyber threat actors to control affected systems Fortinet noted that CVE202421762 is potentially being exploited in the wildpp



ppFollowing the advisory from Fortinet the US Cybersecurity and Infrastructure Security Agency CISA updated its Known Exploited Vulnerabilities KEV Catalog on February 9 2024 to add CVE202421762 CISA confirmed that this vulnerability affecting multiple versions is being actively exploited in attacksppAs per Fortinet CVE202421762 CVSS 96100 rated Critical is an outofbounds write vulnerability detected in SSL VPN It allows remote unauthenticated actors to execute arbitrary codecommands through specially designed HTTP requestsppOn the other hand CVE202423113 CVSS 98100 rated Critical is a format string bug found in the FortiOS Fortigate to FortiManager protocol and allows remote unauthenticated actors to execute arbitrary code and commands However there is no evidence this vulnerability is being exploited in the wildppThe vulnerabilities affect versions 60 62 64 70 72 and 74 Fortinet has released patches for each affected version except for 60 for which users are advised to migrate to a newer version It is worth noting that FortiOS 76 is not impactedppThe vendor stated that it balances customer security with a culture of researcher collaboration and transparency and regularly communicates with customers on security measures through their PSIRT Advisory processppStill the detection of critical vulnerabilities in Fortinet OS has raised concerns among the cybersecurity community CISA had earlier disclosed that a Chinalinked threat group Volt Typhoon has been exploiting vulnerabilities in network appliances from various vendors including Fortinet Citrix Cisco Ivanti and NetGearppIn fact the US authoring agencies have recently observed indications of Volt Typhoon actors maintaining access and footholds within some victim IT environments for at least five years the advisory readppIn one of the instances discovered by the Dutch agencies the group likely obtained initial access by exploiting CVE202242475 in an unpatched network perimeter FortiGate 300D firewallppFor insights into the latest Fortinet flaws and the rising concerns about vulnerabilities in network appliances we reached out to Mayuresh Dani Manager Security Research at Qualys Threat Research Unit who emphasised that Fortinet alerted its partners about the vulnerability before the public advisory Considering this the vulnerability might be easy to exploit and a Proof of Concept PoC disclosure could happen soonpp



ppFortinet sent out advanced notifications to its partners about this vulnerability before the advisory was made public CVE202421762 is already included in the CISA KEV list The exploit code maturity is also ranked as HIGH in the vendorsupplied CVSS scoring noted Mayuresh ppGiven all these facts and the way Fortinet itself has characterized the vulnerability it may be trivial to exploit this vulnerability and that a PoC disclosure is imminent Mayuresh warned Furthermore no user interaction is required for exploitation and there is no mention of how this vulnerability was discovered internally or via external reportspp
pp
Email Address

pp
Name

pp

ppSuper secure VPNppMinimal data loggingppFavorable privacy policyppVisit IPVanishpp
The display of thirdparty trademarks and trade names on the site do not necessarily indicate any affiliation or endorsement of Hackreadcom If you click an affiliate link and buy a product or service we may be paid a fee by that merchant p