Fortinet has released a patch to fix a security vulnerability in its FortiOS SSL VPN product that is potentially being exploited in the wild.
Tracked as CVE-2024-23113, this vulnerability is classified as ‘Critical’ with a CVSS Score of 9.6, which may allow a malicious actor to execute unauthorized code.
Based on the official advisory, FortiOS version 7.6 is not affected by this vulnerability.
_____________________________
A. Nature of Vulnerability
CVE-2024-23113
- An out-of-bounds write vulnerability in FortiOS may allow a remote unauthenticated attacker to execute arbitrary code or command via specially crafted HTTP requests.
_____________________________
B. Affected Version
FortiOS 7.4 7.4.0 through 7.4.2 | Upgrade to 7.4.3 or above |
FortiOS 7.2 7.2.0 through 7.2.6 | Upgrade to 7.2.7 or above |
FortiOS 7.0 7.0.0 through 7.0.13 | Upgrade to 7.0.14 or above |
FortiOS 6.4 6.4.0 through 6.4.14 | Upgrade to 6.4.15 or above |
FortiOS 6.2 6.2.0 through 6.2.15 | Upgrade to 6.2.16 or above |
FortiOS 6.0 6.0 all versions | Migrate to a fixed release |
_____________________________
C. Actions to be Taken
CERT-PH recommends the following actions be taken:
- Kindly review and apply the necessary updates to mitigate future threats.
- For additional information, kindly refer to the official report
- https://www.fortiguard.com/psirt/FG-IR-24-015
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21762