Skip to main content

Fortinet Releases Multiple Security Updates

Updates address 1 Critical, 7 High, 11 Medium, and 2 Low severity vulnerabilities in FortiOS, FortiProxy, FortiSIEM, FortiADC, FortiNAC, FortiManager, FortiAnalyzer, FortiWeb, FortiClientWindows, FortiADCManager, FortiSwitchManager, FortiOS-6K7K, FortiConverter

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Updates address 1 Critical, 7 High, 11 Medium, and 2 Low severity vulnerabilities in FortiOS, FortiProxy, FortiSIEM, FortiADC, FortiNAC, FortiManager, FortiAnalyzer, FortiWeb, FortiClientWindows, FortiADCManager, FortiSwitchManager, FortiOS-6K7K, FortiConverter


Threat details

Critical FortiOS & FortiProxy Vulnerability in SSL-VPN

For further information surrounding the Critical vulnerability CVE-2023-27997, please reference Cyber Alert CC-4334.


Introduction

Fortinet has released security updates to address 1 Critical, 7 High, 11 Medium, and 2 Low severity vulnerabilities in FortiOS, FortiProxy, FortiSIEM, FortiADC, FortiNAC, FortiManager, FortiAnalyzer, FortiWeb, FortiClientWindows, FortiADCManager, FortiSwitchManager, FortiOS-6K7K, and FortiConverter.

The High severity vulnerabilities include:

  • CVE-2023-26210 - Command injection vulnerability for FortiADC & FortiADC Manager
  • CVE-2022-39946 - Access control vulnerability for FortiNAC
  • CVE-2023-22633 - Access control vulnerability for FortiNAC
  • CVE-2023-29181 - Externally-controlled format string vulnerability for FortiOS 
  • CVE-2023-29180 - NULL pointer dereference vulnerability for FortiOS 
  • CVE-2022-41327 - Cleartext transmission vulnerability for FortiOS/FortiProxy 
  • CVE-2022-42478 - Improper restriction of excessive authentication attempts vulnerability for FortiSIEM

Several of the addressed vulnerabilities could allow an attacker to execute unauthorised commands or achieve arbitrary code execution.

For further information on the Medium and Low vulnerabilities please refer to Fortinet's FortiGuard Labs PSIRT Advisories.


Remediation advice

Affected organisations are encouraged to review Fortinet's FortiGuard Labs PSIRT Advisories and apply the relevant updates.

For specific remediation advice around the Critical vulnerability CVE-2023-27997, please reference Cyber Alert CC-4334.


Remediation steps

Type Step
Patch

FortiADC & FortiADC Manager - Command injection vulnerabilities in cli commands


https://www.fortiguard.com/psirt/FG-IR-23-076
Patch

FortiNAC - Improper access control on administrative panels


https://www.fortiguard.com/psirt/FG-IR-22-332
Patch

FortiNAC - SSL Renegotation leading to DoS


https://www.fortiguard.com/psirt/FG-IR-22-521

FortiOS - Format String Bug in Fclicense daemon


https://www.fortiguard.com/psirt/FG-IR-23-119
Patch

FortiOS - Null pointer dereference in sslvnd


https://www.fortiguard.com/psirt/FG-IR-23-111
Patch

FortiOS/FortiProxy - Read Only administrator can intercept sensitive data


https://www.fortiguard.com/psirt/FG-IR-22-380
Patch

FortiSIEM - Bruteforce of Exposed Endpoints


https://www.fortiguard.com/psirt/FG-IR-22-258

CVE Vulnerabilities

Last edited: 13 June 2023 5:08 pm