1.0 Introduction
Recently, Fortinet has released security updates to address vulnerabilities in multiple products, including FortiOS.
2.0 Impact
A cyber threat actor could exploit this vulnerability to take control of an affected system.
3.0 Affected Products
- FG-IR-23-396 Read Only Users Could Run Some Sensitive Operations
- FG-IR-23-475 FortiOS – SSLVPN Session Hijacking Using SAML Authentication
- FG-IR-24-144 Privilege Escalation Via Lua Auto Patch Function
- FG-IR-24-199 Named Pipes Improper Access Control
4.0 Recommendations
CyberSecurity Malaysia encourages users and administrators to review the
Fortinet Security Updates for Multiple Products
and apply necessary updates. Kindly refer to the following URL:
- FG-IR-23-396 Read Only Users Could Run Some Sensitive Operations: https://www.fortiguard.com/psirt/FG-IR-23-396
- FG-IR-23-475 FortiOS – SSLVPN Session Hijacking Using SAML Authentication: https://www.fortiguard.com/psirt/FG-IR-23-475
- FG-IR-24-144 Privilege Escalation Via Lua Auto Patch Function: https://www.fortiguard.com/psirt/FG-IR-24-144
- FG-IR-24-199 Named Pipes Improper Access Control: https://www.fortiguard.com/psirt/FG-IR-24-199
Generally, we advise the users of the devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact us through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17:30 MYT
Web:
https://www.mycert.org.my
5.0 References
- https://www.cisa.gov/news-events/alerts/2024/11/12/fortinet-releases-security-updates-multiple-products
- https://www.fortiguard.com/psirt
- https://www.fortiguard.com/psirt/FG-IR-24-199
- https://www.fortiguard.com/psirt/FG-IR-24-144
- https://www.fortiguard.com/psirt/FG-IR-23-475
- https://www.fortiguard.com/psirt/FG-IR-23-396