Fortinet Rolls Out Crucial Safety Patches for FortiClientLinux Vulnerability

Apr 11, 2024NewsroomVulnerability / Risk Mitigation

Fortinet has launched patches to deal with a essential safety flaw impacting FortiClientLinux that could possibly be exploited to attain arbitrary code execution.

Tracked as CVE-2023-45590, the vulnerability carries a CVSS rating of 9.4 out of a most of 10.

“An Improper Control of Generation of Code (‘Code Injection’) vulnerability [CWE-94] in FortiClientLinux may allow an unauthenticated attacker to execute arbitrary code via tricking a FortiClientLinux user into visiting a malicious website,” Fortinet stated in an advisory.

Cybersecurity

The shortcoming, which has been described as a case of distant code execution attributable to a “dangerous nodejs configuration,” impacts the next variations –

  • FortiClientLinux variations 7.0.3 by means of 7.0.4 and seven.0.6 by means of 7.0.10 (Improve to 7.0.11 or above)
  • FortiClientLinux model 7.2.0 (Improve to 7.2.1 or above)

Safety researcher CataLpa from Dbappsecurity has been credited with discovering and reporting the vulnerability.

Fortinet’s safety patches for April 2024 additionally handle a problem with FortiClientMac installer that would additionally result in code execution (CVE-2023-45588 and CVE-2024-31492, CVSS scores: 7.8).

Additionally resolved is a FortiOS and FortiProxy bug that would leak administrator cookies in sure situations (CVE-2023-41677, CVSS rating: 7.5).

Whereas there is no such thing as a proof of any of the issues being exploited within the wild, it is really useful that customers hold their techniques up-to-date to mitigate potential threats.

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we publish.

Recent articles

U.S. Sanctions Chinese language Cybersecurity Agency Over Treasury Hack Tied to Silk Hurricane

The U.S. Treasury Division's Workplace of International Property Management...

FTC cracks down on Genshin Impression gacha loot field practices

Genshin Impression developer Cognosphere (aka Hoyoverse)...

New ‘Sneaky 2FA’ Phishing Package Targets Microsoft 365 Accounts with 2FA Code Bypass

Jan 17, 2025Ravie LakshmananCybersecurity / Menace Intelligence Cybersecurity researchers have...

LEAVE A REPLY

Please enter your comment!
Please enter your name here