Exploited Vulnerability in Multiple Fortinet Products
A critical vulnerability could lead to unauthenticated arbitrary code execution
Summary
A critical vulnerability could lead to unauthenticated arbitrary code execution
Affected platforms
The following platforms are known to be affected:
Threat details
Exploitation of CVE-2024-23113
CVE-2024-23113 was added to the US Cybersecurity and Infrastructure Security Agency's (CISA) Known Exploited Vulnerability Catalog based on evidence of exploitation in the wild.
SSLVPN and firewall appliances are internet-facing by design and frequent targets for cyber threat groups.
Introduction
Fortinet has released a security advisory to address a critical vulnerability in the FortiOS fgfmd daemon.
CVE-2024-23113 is a ‘use of externally-controlled format string’ vulnerability with a CVSSv3 score of 9.8. A remote unauthenticated attacker could send specially crafted requests to execute arbitrary code (ACE) or commands.
Remediation advice
Affected organisations are encouraged to review Fortinet PSIRT Advisory FG-IR-24-029 and apply security updates as soon as practicable.
NOTE: Fortinet recommends using their Upgrade Path Tool to see the recommended upgrade path for a particular Fortinet product.
Definitive source of threat updates
Last edited: 10 October 2024 1:19 pm