Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Once again, FortiOS is exposed to a critical SSL-VPN vulnerability 

Home

Once again, FortiOS is exposed to a critical SSL-VPN vulnerability 

It is the 8th critical severity vulnerability since Oct 10, 2022, and the 3rd critical RCE vulnerability in the SSL-VPN feature of Fortinet’s Next Generation FortiGate Firewall solution.  

Here, we refer to two recently discovered critical vulnerabilities tagged as CVE-2024-21762 and CVE-2024-23113. 

Overview of CVE-2024-21762 

This vulnerability has a CVSS score of 9.6, which makes it critical. As per Fortinet, the vulnerability allows attackers to remotely execute any arbitrary code or command on the FortiGate devices via specially crafted HTTP requests. SSL-VPN interfaces are generally exposed on the internet, an easy entry point for hackers. 

Vendor Security Guideline: https://www.fortiguard.com/psirt/FG-IR-24-015  

NVD Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-21762 

FortiOS Upgrade Path Guideline: https://docs.fortinet.com/upgrade-tool?ref=thestack.technology 

Overview of CVE-2024-23113 

FortiOS fgfmd daemon is infected with CVE-2024-23113 (a CVSS score of 9.8 vulnerability), which allows a remote unauthenticated attacker to execute arbitrary code or command. This daemon is used for communication between the FortiGate firewall and the FortiManager solution for central configuration management. 

Vendor Security Guideline: https://www.fortiguard.com/psirt/FG-IR-24-029 

NVD Reference: https://nvd.nist.gov/vuln/detail/CVE-2024-24113 

FortiOS Upgrade Path Guideline: https://docs.fortinet.com/upgrade-tool?ref=thestack.technology 

SharkStriker’s recommendations and implemented measures: 

SharkStriker’s customers are already notified of the remediation steps through a security advisory. The Security Operations SOC) team at SharkStriker is actively monitoring customer environments for any suspicious or malicious activities across their environment.   

The following are some of the general measures that we recommend to all our clients and partners:     

  • Apply the necessary patches on FortiOS based on the vendor-released guidelines.  
  • Ensure to monitor Firewall activities with the help of SIEM / XDR solutions such as SharkStriker’s STRIEGO platform.  
  • Disable the SSL-VPN feature if that is not used in the IT environment.  
  • Apply country-based restrictions on the Firewall for various externally exposed services such as SSL-VPN.  
  • Implement Mult-Factor Authentication (MFA). 

We have deployed a new set of detection rules in STRIEGO to detect suspicious or malicious activities relating to the mentioned vulnerabilities. Through STRIEGO’s dashboards, our customers can seamlessly check the status of their cybersecurity posture. 

Recent News

  • Partner Center a unified hub for business growth for partners launched by SharkStriker 
  • SharkStriker Wins the “SIEM Innovation of the Year” award at the 7th CyberSecurity Breakthrough award
  • SharkStriker joins the league of the world’s Top 250 MSSPs, again! 
  • STRIEGO by SharkStriker: A holistic cybersecurity platform launched 
  • SharkStriker launches a data center in South Africa

On-Demand Webinars

  • 8 ways to level up an SMB cybersecurity program
  • Know which cyber insurance will fetch you the maximum ROI for your business.
  • Charter business growth in cybersecurity services market in 2023
  • Live Attack Simulation: Exploring Microsoft Exchange from a Hacker’s POV
  • Affordable enterprise security for SMBs

Services

Experience end-to-end management
of statutory and regulatory compliance
through our dedicated service for compliance

Explore More >

Latest Post

All
Blog
Blog
Webinar
News
Guides
Videos
Data Sheet
Services

The post Once again, FortiOS is exposed to a critical SSL-VPN vulnerability  appeared first on SharkStriker.



This post first appeared on What Is Ransomware? What Is The Cause Of Ransomware Attack?, please read the originial post: here

Share the post

Once again, FortiOS is exposed to a critical SSL-VPN vulnerability 

×

Subscribe to What Is Ransomware? What Is The Cause Of Ransomware Attack?

Get updates delivered right to your inbox!

Thank you for your subscription

×