Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Organizations Warned of Exploited Fortinet FortiOS Vulnerability

CISA has added a FortinetFortiOS vulnerability tracked as CVE-2024-23113 to its Known Exploited Vulnerabilities (KEV) catalog.

Fortinet vulnerability

The US cybersecurity agency CISA on Wednesday warned that a Fortinet FortiOS flaw patched in February is being exploited in the wild and has added it to its Known Exploited Vulnerabilities (KEV) list along with two Ivanti Cloud Services Appliance (CSA) bugs.

Tracked as CVE-2024-23113 (CVSS score of 9.8), the FortiOS defect is described as an externally-controlled format string issue that could lead to arbitrary code execution.

A remote, unauthenticated attacker could send crafted requests to a vulnerable product to exploit the bug, Fortinet noted in its February 2024 advisory.

The cybersecurity firm has yet to update its advisory to mention exploitation of CVE-2024-23113. SecurityWeek has reached out to the company for information on the attacks and will update this article if it responds.

The flaw was addressed with the release of FortiOS versions 7.4.3, 7.2.7, and 7.0.14. Although the patches have been available for several months, CISA’s fresh warning suggests that not all organizations have applied them, opening the door to malicious exploitation.

The agency urges organizations to apply the vendor’s mitigations or remove the vulnerable products if addressing the security defect is not an option.

Advertisement. Scroll to continue reading.

Per Binding Operational Directive (BOD) 22-01, federal agencies have until October 30 to identify any vulnerable FortiOS instances within their environments and apply the patches or discontinue the affected products.

The same applies for their Ivanti CSA instances, which are plagued by several vulnerabilities exploited in the wild, including two that CISA added to the KEV catalog on Wednesday.

The flaws, CVE-2024-9379 and CVE-2024-9380, are a medium-severity SQL injection and a high-severity OS command injection affecting the admin web console of Ivanti CSA before version 5.0.2.

According to Ivanti’s advisory, remote, authenticated attackers could exploit these issues to run arbitrary SQL statements or achieve remote code execution, respectively.

Earlier this week, Ivanti revealed that threat actors have been chaining these vulnerabilities with CVE-2024-8963, a critical-severity path traversal defect in CSA that allows attackers to achieve the authentication requirement. 

All three exploited flaws affect Ivanti CSA version 4.6, which was discontinued on September 10, when Ivanti released patches for them. Ivanti advises all CSA users to migrate to version 5.0 of the product, which is supported.

“We have not observed these vulnerabilities being exploited in any version of CSA 5.0,” Ivanti said.

While BOD 22-01 only applies to federal agencies, all organizations should review CISA’s KEV catalog and prioritize mitigations against the listed security defects or remove the vulnerable products from their environments.

Related: Adobe Commerce Flaw Exploited to Compromise Thousands of Sites

Related: Thousands of Devices Wiped Remotely Following Mobile Guardian Hack

Related: Multiple Security Issues Identified in Peloton Fitness Equipment

Related: Millions of Devices Affected by Vulnerabilities Used in Stolen FireEye Tools

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.