Fortinet Warns of Active Exploitation of New SSL-VPN Pre-auth RCE Vulnerability

0
175
Fortinet Warns of Active Exploitation of New SSL-VPN Pre-auth RCE Vulnerability


Dec 13, 2022Ravie LakshmananVirtual Private Network / Network Security

Fortinet Warns of Active Exploitation of New SSL-VPN Pre-auth RCE Vulnerability

Fortinet on Monday issued emergency patches for a extreme safety flaw affecting its FortiOS SSL-VPN product that it stated is being actively exploited within the wild.

Tracked as CVE-2022-42475 (CVSS rating: 9.3), the vital bug pertains to a heap-based buffer overflow vulnerability that would permit an unauthenticated attacker to execute arbitrary code through specifically crafted requests.

The firm stated it is “conscious of an occasion the place this vulnerability was exploited within the wild,” urging clients to maneuver shortly to use the updates.

CyberSecurity

The following merchandise are impacted by the problem –

  • FortiOS model 7.2.0 by way of 7.2.2
  • FortiOS model 7.0.0 by way of 7.0.8
  • FortiOS model 6.4.0 by way of 6.4.10
  • FortiOS model 6.2.0 by way of 6.2.11
  • FortiOS-6K7K model 7.0.0 by way of 7.0.7
  • FortiOS-6K7K model 6.4.0 by way of 6.4.9
  • FortiOS-6K7K model 6.2.0 by way of 6.2.11
  • FortiOS-6K7K model 6.0.0 by way of 6.0.14

Patches can be found in FortiOS variations 7.2.3, 7.0.9, 6.4.11, and 6.2.12 in addition to FortiOS-6K7K variations 7.0.8, 6.4.10, 6.2.12, and 6.0.15.

SSL-VPN Pre-auth RCE Vulnerability

The American community safety firm has additionally revealed indicators of compromise (IoCs) related to the exploitation makes an attempt, together with the IP addresses and the artifacts which might be current within the file system submit a profitable assault.

The advisory comes two months after Fortinet warned of energetic weaponization of one other vital authentication bypass bug in FortiOS, FortiProxy, and FortiSwitchManager (CVE-2022-40684, CVSS rating: 9.6).

Found this text fascinating? Follow us on Twitter and LinkedIn to learn extra unique content material we submit.

LEAVE A REPLY

Please enter your comment!
Please enter your name here