Fortinet Releases Multiple Security Updates
Updates address 1 Critical, 7 High, 11 Medium, and 2 Low severity vulnerabilities in FortiOS, FortiProxy, FortiSIEM, FortiADC, FortiNAC, FortiManager, FortiAnalyzer, FortiWeb, FortiClientWindows, FortiADCManager, FortiSwitchManager, FortiOS-6K7K, FortiConverter
Summary
Updates address 1 Critical, 7 High, 11 Medium, and 2 Low severity vulnerabilities in FortiOS, FortiProxy, FortiSIEM, FortiADC, FortiNAC, FortiManager, FortiAnalyzer, FortiWeb, FortiClientWindows, FortiADCManager, FortiSwitchManager, FortiOS-6K7K, FortiConverter
Affected platforms
The following platforms are known to be affected:
Threat details
Critical FortiOS & FortiProxy Vulnerability in SSL-VPN
For further information surrounding the Critical vulnerability CVE-2023-27997, please reference Cyber Alert CC-4334.
Introduction
Fortinet has released security updates to address 1 Critical, 7 High, 11 Medium, and 2 Low severity vulnerabilities in FortiOS, FortiProxy, FortiSIEM, FortiADC, FortiNAC, FortiManager, FortiAnalyzer, FortiWeb, FortiClientWindows, FortiADCManager, FortiSwitchManager, FortiOS-6K7K, and FortiConverter.
The High severity vulnerabilities include:
- CVE-2023-26210 - Command injection vulnerability for FortiADC & FortiADC Manager
- CVE-2022-39946 - Access control vulnerability for FortiNAC
- CVE-2023-22633 - Access control vulnerability for FortiNAC
- CVE-2023-29181 - Externally-controlled format string vulnerability for FortiOS
- CVE-2023-29180 - NULL pointer dereference vulnerability for FortiOS
- CVE-2022-41327 - Cleartext transmission vulnerability for FortiOS/FortiProxy
- CVE-2022-42478 - Improper restriction of excessive authentication attempts vulnerability for FortiSIEM
Several of the addressed vulnerabilities could allow an attacker to execute unauthorised commands or achieve arbitrary code execution.
For further information on the Medium and Low vulnerabilities please refer to Fortinet's FortiGuard Labs PSIRT Advisories.
Remediation advice
Affected organisations are encouraged to review Fortinet's FortiGuard Labs PSIRT Advisories and apply the relevant updates.
For specific remediation advice around the Critical vulnerability CVE-2023-27997, please reference Cyber Alert CC-4334.
Remediation steps
| Type | Step |
|---|---|
| Patch |
FortiADC & FortiADC Manager - Command injection vulnerabilities in cli commands https://www.fortiguard.com/psirt/FG-IR-23-076 |
| Patch |
FortiNAC - Improper access control on administrative panels https://www.fortiguard.com/psirt/FG-IR-22-332 |
| Patch |
FortiNAC - SSL Renegotation leading to DoS https://www.fortiguard.com/psirt/FG-IR-22-521 |
|
FortiOS - Format String Bug in Fclicense daemon https://www.fortiguard.com/psirt/FG-IR-23-119 |
|
| Patch |
FortiOS - Null pointer dereference in sslvnd https://www.fortiguard.com/psirt/FG-IR-23-111 |
| Patch |
FortiOS/FortiProxy - Read Only administrator can intercept sensitive data https://www.fortiguard.com/psirt/FG-IR-22-380 |
| Patch |
FortiSIEM - Bruteforce of Exposed Endpoints https://www.fortiguard.com/psirt/FG-IR-22-258 |
CVE Vulnerabilities
Last edited: 13 June 2023 5:08 pm