CERT-In Vulnerability Note
CIVN-2023-0344
Multiple Vulnerabilities in Fortinet Products
Original Issue Date:November 20, 2023
Severity Rating: CRITICAL
Software Affected
- FortiOS 7.4.0
- FortiOS 6.4 all versions
- FortiOS 6.2 all versions
- FortiOS 6.0 all versions
- FortiOS 7.2 (7.2.0 through 7.2.5)
- FortiOS 7.2 (7.2.0 through 7.2.3)
- FortiOS 7.0 (7.0.0 through 7.0.12)
- FortiProxy 7.2 all versions
- FortiProxy 7.0 all versions
- FortiProxy 2.0 all versions
- FortiProxy 1.2 all versions
- FortiProxy 1.1 all versions
- FortiProxy 1.0 all versions
- FortiMail 6.4 all versions
- FortiMail 6.2 all versions
- FortiMail 6.0 all versions
- FortiMail 7.4.0
- FortiMail 7.2 (7.2.0 through 7.2.4)
- FortiMail 7.0 (7.0.0 through 7.0.6)
- FortiClientWindows 7.0 (7.0.0 through 7.0.7)
- FortiClientWindows 6.4 (6.4.0 through 6.4.8)
- FortiClientWindows 6.2 all versions
- FortiClientWindows 6.0 all versions
- FortiClientWindows version 7.2.0 through 7.2.1
- FortiClientWindows version 7.0.0 through 7.0.9
- FGT_VM64_KVM version 7.4.0 through 7.4.1
- FGT_VM64_KVM version 7.2.0 through 7.2.6
- FGT_VM64_KVM version 7.0.1 through 7.0.13
Overview
Multiple Vulnerabilities have been reported in Fortinet Products which could allow an attacker to perform data manipulation, remote code execution, sensitive information disclosure, denial of service, elevation of privilege and security restriction bypass on the targeted system.
Description
Multiple vulnerabilities exist in Fortinet Products due to incorrect authorization, an improper validation of integrity check value, use of hard-coded credentials, null pointer dereference, improper authorization, an untrusted search path, an improper restriction of excessive authentication attempts, a flaw in the Curl package, and a heap-based buffer overflow flaw. An attacker could exploit these vulnerabilities by sending a specially-crafted request to the targeted system.
Successful exploitation of these vulnerabilities could allow an attacker to perform data manipulation, remote code execution, sensitive information disclosure, denial of service, elevation of privilege and security restriction bypass on the targeted system.
Solution
Apply appropriate updates as mentioned:
https://www.fortiguard.com/psirt/FG-IR-22-299
https://www.fortiguard.com/psirt/FG-IR-22-396
https://www.fortiguard.com/psirt/FG-IR-23-108
https://www.fortiguard.com/psirt/FG-IR-23-151
https://www.fortiguard.com/psirt/FG-IR-23-203
https://www.fortiguard.com/psirt/FG-IR-23-274
https://www.fortiguard.com/psirt/FG-IR-23-287
https://www.fortiguard.com/psirt/FG-IR-23-385
Vendor Information
FortiGuard
https://www.fortiguard.com/
CVE Name
CVE-2021-40681
CVE-2023-28002
CVE-2023-33304
CVE-2023-36633
CVE-2023-36641
CVE-2023-38545
CVE-2023-38546
CVE-2023-41840
CVE-2023-45582
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|