Multiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC
Multiple vulnerabilities have been discovered Fortinet Products, the most severe of which could allow for remote code execution.
- FortiManager is a network and security management tool that provides centralized management of Fortinet devices from a single console.
- FortiOS is the Fortinet’s proprietary Operation System which is utilized across multiple product lines.
- FortiProxy is a secure web gateway that attempts to protects users against internet-borne attacks, and provides protection and visibility to the network against unauthorized access and threats.
- FortiAnalyzer is a log management, analytics, and reporting platform that provides organizations with a single console to manage, automate, orchestrate, and respond, enabling simplified security operations, proactive identification and remediation of risks, and complete visibility of the entire attack landscape.
- FortiSandbox 5.0 is a security solution that utilizes a combination of AI/ML, static, and dynamic analysis, inline blocking, and scalable virtual environments to identify, analyze, contextualize, prioritize, and protect against advanced threats in real-time.
- FortiAnalyzer Big Data delivers big data network analytics for large and complex networks.
- FortiSwitch Manager enables network administrators to cut through the complexities of non-FortiGate-managed FortiSwitch deployments.
- FortiPAM provides privileged account management, session monitoring and management, and role-based access control to secure access to sensitive assets and mitigate data breaches.
Successful exploitation of this vulnerability could allow for remote code execution in the context of the affected service account. Depending on the privileges associated with the service account an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Service accounts that are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
–
Read More – Cyber Security Advisories – MS-ISAC