Fortinet fixes important RCE flaws in FortiNAC and FortiWeb

0
265
Fortinet fixes important RCE flaws in FortiNAC and FortiWeb


Fortinet fixes important RCE flaws in FortiNAC and FortiWeb

Cybersecurity options firm Fortinet has launched safety updates for its FortiNAC and FortiWeb merchandise, addressing two critical-severity vulnerabilities which will enable unauthenticated attackers to carry out arbitrary code or command execution.

The first flaw, impacting FortiNAC, is tracked as CVE-2022-39952 and has a CVSS v3 rating of 9.8 (important).

FortiNAC is a community entry management resolution that helps organizations achieve real-time community visibility, implement safety insurance policies, and detect and mitigate threats.

“An exterior management of file identify or path vulnerability [CWE-73] in FortiNAC webserver might enable an unauthenticated attacker to carry out arbitrary write on the system,” reads the safety advisory.

The merchandise impacted by this flaw are:

  • FortiNAC model 9.4.0
  • FortiNAC model 9.2.0 via 9.2.5
  • FortiNAC model 9.1.0 via 9.1.7
  • FortiNAC 8.8 all variations
  • FortiNAC 8.7 all variations
  • FortiNAC 8.6 all variations
  • FortiNAC 8.5 all variations
  • FortiNAC 8.3 all variations

The CVE-2022-39952 vulnerability is fastened in FortiNAC 9.4.1 and later, 9.2.6 and later, 9.1.8 and later, and seven.2.0 and later.

The second vulnerability impacts FortiWeb is CVE-2021-42756, which has a CVSS v3 rating of 9.3 (important).

FortiWeb is an online software firewall (WAF) resolution designed to guard net apps and API from cross-site scripting (XSS), SQL injection, bot assaults, DDoS (distributed denial of service), and different on-line threats.

“Multiple stack-based buffer overflow vulnerabilities [CWE-121] in FortiWeb’s proxy daemon might enable an unauthenticated distant attacker to realize arbitrary code execution by way of particularly crafted HTTP requests,” describes Fortinet’s advisory.

CVE-2021-42756 impacts the under variations:

  • FortiWeb variations 5.x all variations
  • FortiWeb variations 6.0.7 and under
  • FortiWeb variations 6.1.2 and under
  • FortiWeb variations 6.2.6 and under
  • FortiWeb variations 6.3.16 and under
  • FortiWeb variations 6.4 all variations

To handle the flaw, admins ought to improve to FortiWeb 7.0.0 or later, 6.3.17 or later, 6.2.7 or later, 6.1.3 or later, and 6.0.8 or later.

Strangely, the CVE ID signifies that the vulnerability was found in 2021 however was not publicly disclosed till now.

The vendor has not offered mitigation recommendation or workarounds for both of the failings, so making use of the obtainable safety updates is the one method to handle the dangers.

LEAVE A REPLY

Please enter your comment!
Please enter your name here