Skip to main content

Exploited Vulnerability in Multiple Fortinet Products

A critical vulnerability could lead to unauthenticated arbitrary code execution

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

A critical vulnerability could lead to unauthenticated arbitrary code execution


Threat details

Exploitation of CVE-2024-23113

CVE-2024-23113 was added to the US Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerability Catalog based on evidence of exploitation in the wild.

SSLVPN and firewall appliances are internet-facing by design and frequent targets for cyber threat groups.


Introduction

Fortinet has released a security advisory to address a critical vulnerability in the FortiOS fgfmd daemon. 

CVE-2024-23113 is a ‘use of externally-controlled format string’ vulnerability with a CVSSv3 score of 9.8. A remote unauthenticated attacker could send specially crafted requests to execute arbitrary code (ACE) or commands. 
 


Remediation advice

Affected organisations are encouraged to review Fortinet PSIRT Advisory FG-IR-24-029 and apply security updates as soon as practicable. 

NOTE: Fortinet recommends using their Upgrade Path Tool to see the recommended upgrade path for a particular Fortinet product.


Definitive source of threat updates


Last edited: 10 October 2024 1:19 pm