TLP : CLEAR
Date : 13/06/2024
REF NO : CERT / 2024/06/54
Severity Level: Medium
Components Affected
Overview
Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution and security restriction bypass on the targeted system.
Description
A vulnerability in DHCP can add routes to a client’s routing table via the classless static route option (121), causing VPN-based security solutions that rely on routes to redirect traffic to potentially leak traffic over the physical interface. This exposes network traffic, expected to be protected by the VPN, to attackers on the same local network who can read, disrupt, or modify it. Additionally, several versions of Fortinet products, including FortiPAM, FortiWeb, FortiAuthenticator, FortiSwitchManager, FortiOS, and FortiProxy, contain a stack-based buffer overflow vulnerability. This flaw allows attackers to execute unauthorized code or commands via specially crafted packets in the affected versions, posing a significant security risk.
Impact
Solution/ Workarounds
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
Reference
Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.
Sri Lanka Computer Emergency Readiness Team | Coordination Centre