Fortinet Security Updates – 15 May 2024

Fortinet has released security updates to fix several vulnerabilities across multiple Fortinet products.

The addressed vulnerabilities could allow the remote attacker to perform denial of service attacks, execute arbitrary code, and gain access to the affected products by sending specially crafted HTTP requests.

Sample of the addressed vulnerabilities:

1. Fortinet FortiWebManager Code Execution Vulnerability (CVE-2024-3667):

  • CVSS: 8.6
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Consequences: Gain Access

2. Fortinet FortiPortal Improper Access Control Vulnerability (CVE-2024-23105):

  • CVSS: 7.1
  • Attack Vector: Network
  • Attack Complexity: High
  • Privileges Required: Low
  • User Interaction: None
  • Consequences: Bypass Security

Sample of the affected products:

  • FortiSwitchManager.
  • FortiPortal.
  • FortiSOAR.
  • FortiADC.
  • FortiAuthenticator.
  • FortiProxy.
  • FortiWebManager.
Vulnerabilities
  • CVE-2023-46714
  • CVE-2024-23105
  • CVE-2023-48789
  • CVE-2024-21760
  • CVE-2023-44247
  • CVE-2023-50180
  • CVE-2023-36640
  • CVE-2023-45583
  • CVE-2024-23664
  • CVE-2023-40720
  • CVE-2024-31493
  • CVE-2024-23667
  • CVE-2024-23668
  • CVE-2024-23669
  • CVE-2024-23670
  • CVE-2024-26007
  • CVE-2024-23107
  • CVE-2024-31491
  • CVE-2023-45586
  • CVE-2024-31488
  • CVE-2024-23665
Mitigations

The enterprise should deploy this patch as soon as the testing phase is completed.

Fortinet Security Advisory

References