Your review has been sent successfully

Fortinet Alert

3328
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

7 March, 2023

● Critical

2023-5492

All

Description:

Fortinet has released security updates to address a vulnerability in the following products:

  • FortiNAC version 9.4.0 through 9.4.1
  • FortiNAC version 9.2.0 through 9.2.6
  • FortiNAC version 9.1.0 through 9.1.8
  • FortiNAC all versions 8.8, 8.7, 8.6, 8.5, 8.3
  • FortiOS version 7.2.0 through 7.2.3
  • FortiOS version 7.0.0 through 7.0.9
  • FortiOS version 6.4.0 through 6.4.11
  • FortiOS version 6.2.0 through 6.2.12
  • FortiOS 6.0 all versions
  • FortiProxy version 7.2.0 through 7.2.2
  • FortiProxy version 7.0.0 through 7.0.8
  • FortiProxy version 2.0.0 through 2.0.11
  • FortiProxy 1.2 all versions
  • FortiProxy 1.1 all versions
  • FortiSOAR version 7.3.0 through 7.3.1
  • FortiWeb version 7.0.0 through 7.0.2
  • FortiWeb version 6.3.6 through 6.3.20
  • FortiWeb 6.4 all versions
Threats:

The above vulnerabilities can be exploited to perform the following:

  • Heap Buffer Underflow leads to Remote Code Execution
  • Arbitrary Code Execution
  • Privilege Escalation
  • Path traversal
  • Improper Authorization
  • Cross Site scripting (XSS)
Best practice and Recommendations:

The CERT team encourages users to review Fortinet security advisory and apply the necessary updates:

https://www.fortiguard.com/psirt

Last updated at 7 March, 2023

Rate the content

rate-icon
up icon