Thursday, July 4, 2024

Fortinet Rolls Out Vital Safety Patches for FortiClientLinux Vulnerability

Apr 11, 2024NewsroomVulnerability / Risk Mitigation

Fortinet

Fortinet has launched patches to deal with a essential safety flaw impacting FortiClientLinux that might be exploited to realize arbitrary code execution.

Tracked as CVE-2023-45590, the vulnerability carries a CVSS rating of 9.4 out of a most of 10.

“An Improper Management of Era of Code (‘Code Injection’) vulnerability [CWE-94] in FortiClientLinux might enable an unauthenticated attacker to execute arbitrary code by way of tricking a FortiClientLinux consumer into visiting a malicious web site,” Fortinet mentioned in an advisory.

Cybersecurity

The shortcoming, which has been described as a case of distant code execution resulting from a “harmful nodejs configuration,” impacts the next variations –

  • FortiClientLinux variations 7.0.3 by way of 7.0.4 and seven.0.6 by way of 7.0.10 (Improve to 7.0.11 or above)
  • FortiClientLinux model 7.2.0 (Improve to 7.2.1 or above)

Safety researcher CataLpa from Dbappsecurity has been credited with discovering and reporting the vulnerability.

Fortinet’s safety patches for April 2024 additionally tackle a difficulty with FortiClientMac installer that would additionally result in code execution (CVE-2023-45588 and CVE-2024-31492, CVSS scores: 7.8).

Additionally resolved is a FortiOS and FortiProxy bug that would leak administrator cookies in sure situations (CVE-2023-41677, CVSS rating: 7.5).

Whereas there isn’t a proof of any of the issues being exploited within the wild, it is really useful that customers hold their methods up-to-date to mitigate potential threats.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we submit.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles