Fortinet patched a critical vulnerability in its FortiClient Enterprise Management Server software that can allow attackers to gain remote code execution on vulnerable servers.
FortiClient EMS enables admins to manage endpoints connected to an enterprise network, allowing them to deploy FortiClient software and assign security profiles on Windows devices.
The security flaw is an SQL injection in the DB2 Administration Server component, which was discovered and reported by the UK's National Cyber Security Centre and Fortinet developer Thiago Santana.
It impacts FortiClient EMS versions 7.0 and 7.2, and it allows unauthenticated attackers to gain RCE with SYSTEM privileges on unpatched servers in low-complexity attacks that don't require user interaction.
Fortinet has not revealed if it has any evidence of CVE-2023-48788 being exploited in attacks before patching.
Horizon3's Attack Team confirmed the bug's critical severity today and said they'll publish proof-of-concept exploit code and a technical deep-dive next week.
Two other high-severity flaws, an improper access control in FortiWLM MEA for FortiManager and a CSV injection in FortiClient EMS, patched this week, allow threat actors to execute arbitrary commands or code on vulnerable systems.
One day later, CISA confirmed CVE-2024-21762's active exploitation one day later and ordered federal agencies to secure their FortiOS and FortiProxy devices within seven days.
Fortinet flaws are regularly exploited to breach corporate networks in ransomware attacks and cyber espionage campaigns.
Fortinet revealed in February that the Chinese Volt Typhoon hacking group used two FortiOS SSL VPN flaws to deploy the Coathanger custom remote access trojan malware previously used to backdoor a military network of the Dutch Ministry of Defence.
Critical Fortinet flaw may impact 150,000 exposed devices.
Exploit available for new critical TeamCity auth bypass bug, patch now.
Hackers exploit critical RCE flaw in Bricks WordPress site builder.
ConnectWise urges ScreenConnect admins to patch critical RCE flaw.
SolarWinds fixes critical RCE bugs in access rights audit solution.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Wed, 13 Mar 2024 18:50:23 +0000