Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Fortinet Patches Critical FortiSwitch Vulnerability

Fortinet fixes a critical-severity bug in FortiSwitch that could allow an attacker to modify administrative passwords.

Fortinet vulnerability

Fortinet on Tuesday announced patches for 10 vulnerabilities across its products, including a critical-severity bug in FortiSwitch.

Tracked as CVE-2024-48887 (CVSS score of 9.3), the FortiSwitch issue could allow an attacker to modify administrative passwords, the company warns.

“An unverified password change vulnerability in FortiSwitch GUI may allow a remote unauthenticated attacker to modify admin passwords via a specially crafted request,” reads Fortinet’s advisory.

Disabling HTTP/HTTPS access from administrative interfaces and limiting the hosts that can connect to the system should mitigate the flaw, the company says.

The bug impacts FortiSwitch versions 6.4 to 7.6 and was addressed with the release of FortiSwitch versions 6.4.15, 7.0.11, 7.2.9, 7.4.5, and 7.6.1.

Patches were also released for CVE-2024-26013 and CVE-2024-50565, two high-severity vulnerabilities that could allow unauthenticated attackers to perform man-in-the-middle (MitM) attacks, intercept FGFM authentication requests between management and managed devices, and impersonate the management device (either the FortiCloud server or FortiManager).

Described as ‘improper restriction of communication channel to intended endpoints’ bugs, the security defects impact FortiOS, FortiProxy, FortiManager, FortiAnalyzer, FortiVoice, and FortiWeb.

On Tuesday, Fortinet also announced fixes for CVE-2024-54024, a high-severity OS command injection flaw in FortiIsolator that could allow an authenticated attacker with super-admin privileges and CLI access to execute arbitrary code via crafted HTTP requests.

Advertisement. Scroll to continue reading.

The company also released patches for four medium-severity issues, including an OS command injection bug in FortiIsolator, a log pollution flaw in FortiManager and FortiAnalyzer, an incorrect user management defect in the FortiWeb widgets dashboard, and a path traversal in FortiWeb.

An insufficiently protected credentials bug in FortiOS was also resolved, as well as an improper neutralization of input during web page generation issue in FortiClient, both low-severity.

Fortinet makes no mention of any of these vulnerabilities being exploited in the wild, but users are advised to update their appliances as soon as possible, as it is not uncommon for threat actors to exploit flaws in Fortinet products. Additional information can be found on the company’s PSIRT advisories page.

Related: Recent Fortinet Vulnerabilities Exploited in ‘SuperBlack’ Ransomware Attacks

Related: Fortinet Patches 18 Vulnerabilities

Related: Ivanti, Fortinet Patch Remote Code Execution Vulnerabilities

Related: Fortinet Confirms New Zero-Day Exploitation

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Wendi Whitmore has taken the role of Chief Security Intelligence Officer at Palo Alto Networks.

Phil Venables, former CISO of Google Cloud, has joined Ballistic Ventures as a Venture Partner.

David Currie, former CISO of Nubank and Klarna, has been appointed CEO of Vaultree.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.