Article Details

Scrape Timestamp (UTC): 2024-02-08 05:19:30.198

Source: https://thehackernews.com/2024/02/critical-patches-released-for-new-flaws.html

Original Article Text

Click to Toggle View

Critical Patches Released for New Flaws in Cisco, Fortinet, VMware Products. Cisco, Fortinet, and VMware have released security fixes for multiple security vulnerabilities, including critical weaknesses that could be exploited to perform arbitrary actions on affected devices. The first set from Cisco consists of three flaws – CVE-2024-20252 and CVE-2024-20254 (CVSS score: 9.6) and CVE-2024-20255 (CVSS score: 8.2) – impacting Cisco Expressway Series that could allow an unauthenticated, remote attacker to conduct cross-site request forgery (CSRF) attacks. All the issues, which were found during internal security testing, stem from insufficient CSRF protections for the web-based management interface that could permit an attacker to perform arbitrary actions with the privilege level of the affected user. "If the affected user has administrative privileges, these actions could include modifying the system configuration and creating new privileged accounts," Cisco said about CVE-2024-20252 and CVE-2024-20254. On the other hand, successful exploitation of CVE-2024-20255 targeting a user with administrative privileges could enable the threat actor to overwrite system configuration settings, resulting in a denial-of-service (DoS) condition. Another crucial difference between the two sets of flaws is that while the former two affect Cisco Expressway Series devices in the default configuration, CVE-2024-20252 only impacts them if the cluster database (CDB) API feature has been enabled. It's disabled by default. Patches for the vulnerabilities are available in Cisco Expressway Series Release versions 14.3.4 and 15.0.0. Fortinet, for its part, has released a second round of updates to address what are bypasses for a previously disclosed critical flaw (CVE-2023-34992, CVSS score: 9.7) in FortiSIEM supervisor that could result in the execution of arbitrary code, according to Horizon3.ai researcher Zach Hanley. Tracked as CVE-2024-23108 and CVE-2024-23109 (CVSS scores: 9.8), the flaws "may allow a remote unauthenticated attacker to execute unauthorized commands via crafted API requests." It's worth noting that Fortinet resolved another variant of CVE-2024-20272 by closing out CVE-2023-36553 (CVSS score: 9.3) in November 2023. The two new vulnerabilities are/will be plugged in the following versions - Completing the trifecta is VMware, which has warned of five moderate-to-important severity flaws in Aria Operations for Networks (formerly vRealize Network Insight) - To mitigate the risks, all users of VMware Aria Operations for Networks version 6.x are being recommended to upgrade to version 6.12.0. Considering the history of exploitation when it comes to Cisco, Fortinet, and VMware flaws, patching is a necessary and crucial first step that organizations need to take to handle the shortcomings. ⚡ Free Risk Assessment from Vanta Generate a gap assessment of your security and compliance posture, discover shadow IT, and more.

Daily Brief Summary

CYBERCRIME // Cisco, Fortinet, VMware Issue Fixes for Critical Security Flaws

Cisco released patches for three vulnerabilities in Cisco Expressway Series with CVSS scores up to 9.6, potentially allowing unauthenticated remote CSRF attacks.

Fortinet published a second round of updates for FortiSIEM supervisor critical flaw bypasses, with the new vulnerabilities having CVSS scores of 9.8.

VMware warned of five moderate-to-high severity flaws in Aria Operations for Networks, advising users to upgrade to version 6.12.0 to mitigate risks.

The vulnerabilities could enable attackers to execute arbitrary code or actions, modify system configurations, create privileged accounts, or induce DoS conditions.

Patches have been released in specific versions for all the affected products and users are urged to apply them promptly due to the history of active exploitation.

Organizations are recommended to prioritize patch management to protect against these newly disclosed vulnerabilities and improve overall security posture.