1.0 Introduction
Recently, Fortinet has released security updates to address multiple vulnerabilities in its multiple products.
2.0 Impact
A cyber threat actor could exploit this vulnerability to execute commands, bypass authentication, or gain unauthorized access to devices and sensitive data.
3.0 Affected Products
| Product & Major Version | Affected Versions |
|---|---|
| FortiWeb 7.6 | 7.6.0 – 7.6.3 |
| FortiWeb 7.4 | 7.4.0 – 7.4.7 |
| FortiWeb 7.2 | 7.2.0 – 7.2.10 |
| FortiWeb 7.0 | 7.0.0 – 7.0.10 |
| FortiSIEM 7.3 | 7.3.0 – 7.3.1 |
| FortiSIEM 7.2 | 7.2.0 – 7.2.5 |
| FortiSIEM 7.1 | 7.1.0 – 7.1.7 |
| FortiSIEM 7.0 | 7.0.0 – 7.0.3 |
| FortiSIEM 6.7 | 6.7.0 – 6.7.9 |
| FortiOS 6.4 | 6.4.0 – 6.4.15 |
| FortiOS 6.2 | 6.2.0 – 6.2.16 |
| FortiOS 6.0 | All versions |
| FortiPAM 1.2 | All versions |
| FortiPAM 1.1 | All versions |
| FortiPAM 1.0 | All versions |
| FortiProxy 7.4 | 7.4.0 – 7.4.2 |
| FortiProxy 7.2 | 7.2.0 – 7.2.8 |
| FortiProxy 7.0 | 7.0.0 – 7.0.15 |
| FortiSwitchManager 7.2 | 7.2.0 – 7.2.3 |
| FortiSwitchManager 7.0 | 7.0.0 – 7.0.3 |
4.0 Recommendations
CyberSecurity Malaysia encourages users and administrators to review the Fortinet Security Updates for Multiple Products and apply necessary updates. Kindly refer to the following URL:
- FG-IR-25-152 - Remote unauthenticated command injection
- FG-IR-24-042 - Weak authentication - FGFM protocol
- FG-IR-25-448 - Authentication bypass via invalid parameter
Generally, CyberSecurity Malaysia advise the users of the devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact us through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17:30 MYT
Web: https://www.cybersecurity.my
5.0 References