Security researchers have released a proof-of-concept exploit for a maximum-severity vulnerability in Fortinet's security information and event management solution, which was patched in February.
Tracked as CVE-2024-23108, this security flaw is a command injection vulnerability discovered and reported by Horizon3 vulnerability expert Zach Hanley that enables remote command execution as root without requiring authentication.
CVE-2024-23108 impacts FortiClient FortiSIEM versions 6.4.0 and higher and was patched by the company on February 8, together with a second RCE vulnerability with a 10/10 severity score.
The company eventually confirmed they were both CVE-2023-34992 variants with the same description as the original vulnerability.
On Tuesday, over three months after Fortinet released security updates to patch this security flaw, Horizon3's Attack Team shared a proof-of-concept exploit and published a technical deep-dive.
The PoC exploit released today by Horizon3 helps execute commands as root on any Internet-exposed and unpatched FortiSIEM appliances.
Horizon3's Attack Team also released a PoC exploit for a critical flaw in Fortinet's FortiClient Enterprise Management Server software, which is now actively exploited in attacks.
Fortinet vulnerabilities are frequently exploited-often as zero-days-in ransomware and cyber espionage attacks targeting corporate and government networks.
The company revealed in February that Chinese Volt Typhoon hackers used two FortiOS SSL VPN flaws to deploy the Coathanger remote access trojan, a malware strain that was also recently used to backdoor a military network of the Dutch Ministry of Defence.
QNAP QTS zero-day in Share feature gets public RCE exploit.
Maximum severity Flowmon bug has a public exploit, patch now.
Critical Fluent Bit flaw impacts all major cloud providers.
PoC exploit released for RCE zero-day in D-Link EXO AX4800 routers.
Widely used modems in industrial IoT devices open to SMS attack.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Tue, 28 May 2024 16:20:08 +0000