Fresh critical bug in FortiOS SSL VPN is already under attack

Fortinet warns of a new critical vulnerability in FortiOS SSL VPN, which can already be used by attackers for attacks.

The vulnerability is designated as CVE-2024-21762 and is rated 9.6 on the CVSS scale. It involves out-of-bounds writes and allows unauthorized attackers to remotely execute arbitrary code.

To resolve this issue, Fortinet recommends upgrading to one of the latest versions listed in the table below.

Version Vulnerability Fix
FortiOS 7.6 Not affected Not required
FortiOS 7.4 from 7.4.0 to 7.4.2 version 7.4.3 and later
FortiOS 7.2 from 7.2.0 to 7.2.6 version 7.2.7 and later
FortiOS 7.0 from 7.0.0 to 7.0.13 version 7.0.14 and later
FortiOS 6.4 from 6.4.0 to 6.4.14 version 6.4.15 and later
FortiOS 6.2 from 6.2.0 to 6.2.15 version 6.2.16 and later
FortiOS 6.0 6.0 all versions Migration to fixed release

For those who cannot install patches immediately, an alternative solution to the problem is to disable SSL VPN on FortiOS devices.

Fortinet’s alert does not provide any details about how the vulnerability is being exploited or who discovered it. This flaw was disclosed along with critical issue CVE-2024-23113, as well as vulnerabilities CVE-2023-44487 and CVE-2023-47537, but these bugs are not marked as already exploited by hackers.

It is worth noting that a day earlier, Fortinet reported that Chinese hackers from the Volt Typhoon group were using vulnerabilities in FortiOS to deploy a custom COATHANGER malware. The malware is a remote access trojan (RAT) designed to infect Fortigate security devices and was recently used to attack the Dutch Ministry of Defense.

0 / 5

Your page rank:

Subscribe: YouTube page opens in new windowLinkedin page opens in new windowTelegram page opens in new window

Leave a Reply

Your email address will not be published. Required fields are marked *

Post comment