Fortinet Security Updates – 13 March 2024

Fortinet has released security updates to fix several vulnerabilities across multiple Fortinet products.

The addressed vulnerabilities could allow the remote attacker to bypass security restrictions, gain elevated privileges, manipulate data, view, add, modify, or delete information in the back-end database, execute arbitrary code, and gain access to the affected products by sending specially crafted HTTP requests.

Sample of the addressed vulnerability:

1. Fortinet FortiClientEMS SQL Injection Vulnerability (CVE-2023-48788):

  • CVSS: 9.3
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Consequences: Data Manipulation

2. Fortinet FortiOS and FortiProxy Code Execution (CVE-2023-42789):

  • CVSS: 9.3
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Consequences: Gain Access

Sample of the affected products:

  • FortiManager.
  • FortiAnalyzer.
  • FortiPortal.
  • FortiOS.
  • FortiProxy.
  • FortiClientEMS.
Vulnerabilities
  • CVE-2023-48788
  • CVE-2023-42789
  • CVE-2023-42790
  • CVE-2023-36554
  • CVE-2024-21761
  • CVE-2023-46717
  • CVE-2024-23112
  • CVE-2023-41842
  • CVE-2023-47534
Mitigations

The enterprise should deploy this patch/workarounds as soon as the testing phase is completed.

Fortinet Security Advisory

References