Skip to main content

Fortinet Releases Security Update for FortiOS and FortiProxy XSS Vulnerability

CVE-2024-26006 is a cross-site scripting vulnerability in SSL-VPN web UI

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

CVE-2024-26006 is a cross-site scripting vulnerability in SSL-VPN web UI


Threat details

Introduction

Fortinet has released a security update to address a medium severity vulnerability in the FortiOS and FortiProxy web secure sockets layer (SSL) virtual private network (VPN) user interface (UI).

CVE-2024-26006 is an 'improper neutralisation of input during web page generation' vulnerability with a CVSSv3 score of 6.9. A remote attacker could perform a cross-site scripting (XSS) attack after luring a user into bookmarking a malicious Samba server and then opening the bookmark. A successful XSS attack could allow the attacker the ability to execute unauthorised code or commands.

SSL-VPN vulnerabilities

VPN appliances are often internet-facing by design and frequent targets for exploitation by cyber threat groups. Previous Fortinet SSL-VPN vulnerabilities have been exploited in the wild within days of official disclosure.


Remediation advice

Affected organisations are encouraged to review Fortinet PSIRT Advisory FG-IR-23-485 and apply security updates as soon as practicable. 

NOTE: Fortinet recommends using their Upgrade Path Tool to see the recommended upgrade path for a particular Fortinet product.


Definitive source of threat updates


Last edited: 10 July 2024 2:40 pm