Skip to main content

Fortinet Releases Security Updates for FortiNAC

Advisories include one critical vulnerability that could allow an attacker to execute unauthorised code or commands

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Advisories include one critical vulnerability that could allow an attacker to execute unauthorised code or commands


Threat details

Introduction

Fortinet has released security advisories to address two vulnerabilities in FortiNAC products. The Critical vulnerability is known as CVE-2023-33299 and has a CVSSv3 score of 9.6. This vulnerability concerns deserialisation of untrusted data and could allow an unauthenticated user to execute unauthorised code or commands via specifically crafted requests. 

The Medium severity vulnerability known as CVE-2023-33300 concerns command injection and could allow an unauthenticated attacker to copy local files of the device to other local directories of the device via specially crafted input fields.

Proof-of-concept released for CVE-2023-33299 and CVE-2023-33300

proof-of-concept has been released for CVE-2023-33299 which is a remote code execution vulnerability and CVE-2023-33300, a command injection vulnerability. Exploitation is considered more likely.


Threat updates

Date Update
26 Jun 2023 Proof-of-concept released

Article updated to reflect the release of public proof-of-concept code.


Remediation advice

Affected organisations are encouraged to review Fortinet's Product Security Incident Response Team's PSIRT Advisories page and apply any relevant updates.


Remediation steps

Type Step
Patch

FortiNAC - java untrusted object deserialization RCE| FG-IR-23-074


https://www.fortiguard.com/psirt/FG-IR-23-074
Patch

FortiNAC - argument injection in XML interface on port tcp/5555 | FG-IR-23-096


https://www.fortiguard.com/psirt/FG-IR-23-096

Definitive source of threat updates


Last edited: 26 June 2023 12:08 pm