Article Details
Scrape Timestamp (UTC): 2024-04-11 05:31:02.129
Source: https://thehackernews.com/2024/04/fortinet-has-released-patches-to.html
Original Article Text
Click to Toggle View
Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability. Fortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code execution. Tracked as CVE-2023-45590, the vulnerability carries a CVSS score of 9.4 out of a maximum of 10. "An Improper Control of Generation of Code ('Code Injection') vulnerability [CWE-94] in FortiClientLinux may allow an unauthenticated attacker to execute arbitrary code via tricking a FortiClientLinux user into visiting a malicious website," Fortinet said in an advisory. The shortcoming, which has been described as a case of remote code execution due to a "dangerous nodejs configuration," impacts the following versions - Security researcher CataLpa from Dbappsecurity has been credited with discovering and reporting the vulnerability. Fortinet's security patches for April 2024 also address an issue with FortiClientMac installer that could also lead to code execution (CVE-2023-45588 and CVE-2024-31492, CVSS scores: 7.8). Also resolved is a FortiOS and FortiProxy bug that could leak administrator cookies in certain scenarios (CVE-2023-41677, CVSS score: 7.5). While there is no evidence of any of the flaws being exploited in the wild, it's recommended that users keep their systems up-to-date to mitigate potential threats. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.
Daily Brief Summary
Fortinet has released critical security patches for a severe vulnerability in FortiClientLinux, identified as CVE-2023-45590.
The vulnerability has a high severity score of 9.4 and allows for arbitrary code execution through improper code generation.
Attackers can exploit the flaw by tricking users into visiting a malicious website, leading to potential remote code execution.
The issue is attributed to a dangerous nodejs configuration in the affected FortiClientLinux versions.
Additional patches include fixes for FortiClientMac installer vulnerabilities and a FortiOS/FortiProxy bug that could expose administrator cookies.
The vulnerabilities were discovered and reported by CataLpa from Dbappsecurity.
While there have been no reports of these vulnerabilities being exploited in the wild, Fortinet advises users to update their systems promptly to avoid potential security threats.