Fortra Security Update – 27 June 2024

Fortra has released a security update to address several vulnerabilities in multiple Fortra products.

The addressed vulnerabilities could allow the attacker to gain elevated privileges, obtain sensitive information, bypass security restrictions, or manipulate data and gain access to the affected system.

Sample of the addressed vulnerabilities:

1. Fortra FileCatalyst Workflow SQL Injection (CVE-2024-5276):

  • CVSS: 9.8
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Consequences: Data Manipulation

2. Fortra FileCatalyst Direct Hard-coded password (CVE-2024-5275):

  • CVSS: 7.8
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Consequences: Gain Access

Affected products:

  • FileCatalyst Direct 3.8.10 Build 138 TransferAgent and earlier.
  • FileCatalyst Workflow 5.1.6 Build 130 and earlier.
  • FileCatalyst Workflow 5.1.6 Build 135 and earlier.
  • Tripwire Enterprise 9.1.0.
  • Fortra’s Robot Schedule Enterprise Agent for Windows before 3.04.

It should be highlighted that Tenable discovered vulnerability “CVE-2024-5276” along with a proof-of-concept (PoC) exploit demonstrating the vulnerability exists in the wild.

Vulnerabilities
  • CVE-2024-5275
  • CVE-2024-5276
  • CVE-2024-4332
  • CVE-2024-0259
Mitigations

The enterprise should deploy this patch as soon as the testing phase is completed.

Fortra Security Update

References