Researchers have identified several potentially serious vulnerabilities in products from network security solutions provider Fortinet. The vendor appears to have patched at least some of the issues.
The CERT Coordination Center (CERT/CC) reported on Tuesday that a group of researchers called Virgoteam identified a total of five vulnerabilities, including ones rated critical, in Fortinet’s FortiWAN network load balancer appliances.
One of the flaws, tracked as CVE-2016-4965, is caused by improper neutralization of special elements used in operating system commands and it allows an authenticated attacker with non-admin privileges to inject arbitrary OS commands and execute them with root permissions.
The second issue, identified as CVE-2016-4966, is related to a function called tcpdump that allows users to capture and download FortiWAN data packets for analysis. Experts discovered that an authenticated attacker can download a PCAP file containing all packets captured since the tcpdump function was enabled.
Researchers also discovered a couple of information exposure vulnerabilities that allow low-privileged authenticated attackers to obtain a backup of the device configuration (CVE-2016-4967) and administrator login cookies (CVE-2016-4968). CERT/CC’s advisory also describes a cross-site scripting (XSS) issue tracked as CVE-2016-4969.
The release notes published by Fortinet for FortiWAN version 4.2.5 on August 19 show that the latest version of the software patches several security flaws. Of the issues disclosed in the CERT/CC advisory, only CVE-2016-4966 is named specifically, but the description of other fixes mentioned in the release notes suggests that at least three of the other vulnerabilities have been patched as well.
CERT/CC has not been able to confirm that vulnerabilities other than CVE-2016-4966 have been patched. SecurityWeek has reached out to Fortinet for clarifications and will update this article if the vendor responds.
It’s also worth noting that release notes published for Fortinet AscenLink load balancers last month suggest that the vulnerabilities found by Virgoteam affect these appliances as well.
Fortinet is one of the several firewall vendors whose products have been targeted by the exploits leaked recently by a group calling itself Shadow Brokers. Unlike Cisco, which identified a zero-day vulnerability in the leak, Fortinet determined that the remote code execution exploit targeting FortiGate and FortiSwitch products was addressed in 2012.
UPDATE. Fortinet has published an advisory to confirm that all the vulnerabilities disclosed by CERT/CC have been patched in version 4.2.5.
Related: Vulnerabilities Found in Several Fortinet Products
Related: Fortinet Acquires Security Monitoring Firm AccelOps
Related: Flaw in Fortinet Login Page Allowed Attackers to Phish Credentials

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
Latest News
- What if the Current AI Hype Is a Dead End?
- Microsoft Makes SMB Signing Default Requirement in Windows 11 to Boost Security
- Zyxel Urges Customers to Patch Firewalls Against Exploited Vulnerabilities
- Gigabyte Rolls Out BIOS Updates to Remove Backdoor From Motherboards
- SBOMs – Software Supply Chain Security’s Future or Fantasy?
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
