The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has officially added a critical security flaw in Fortinet's products to its Known Exploited Vulnerabilities catalog due to evidence of active exploitation. The vulnerability, categorized as CVE-2024-23113, which poses a CVSS score of 9.8, relates to remote code execution that affects FortiOS, FortiPAM, FortiProxy, and FortiWeb systems. Fortinet warns that a remote unauthenticated attacker could exploit this flaw using specially crafted requests.
Federal Civilian Executive Branch agencies are under directive to apply the necessary mitigations provided by the vendor by the set deadline of October 30, 2024, to ensure maximum protection against this identified vulnerability. As exploitations are ongoing, timely responses from affected agencies are crucial.
Alongside Fortinet's issue, Palo Alto Networks disclosed critical flaws in its Expedition software, potentially allowing attackers to access sensitive information. These include vulnerabilities affecting all versions prior to 1.2.96, with CVSS scores reflecting significant risks – one noted at a high score of 9.9, allowing unauthenticated attackers to run arbitrary OS commands as root.
Palo Alto Networks provided details on multiple vulnerabilities, such as an OS command injection that lets attackers read database contents or arbitrary files. The resulting exposure could lead to unauthorized access to critical information, highlighting the urgency of system updates.
Collection
[
|
...
]