lead to remote code execution.
Fortinet Discloses Critical Flaw Exploited in Limited Attacks on Government and Critical Infrastructure
Fortinet, a leading provider of cybersecurity solutions, has announced the discovery of a newly patched critical vulnerability that could potentially lead to remote code execution. The vulnerability, tracked as CVE-2023-27997 (CVSS score: 9.2), is a heap-based buffer overflow vulnerability that has impacted FortiOS and FortiProxy SSL-VPN. According to the company, it may have already been exploited in a limited number of cases that targeted the government, manufacturing, and critical infrastructure sectors.
The vulnerability has been identified as a heap-based buffer overflow, which makes room for remote code execution, potentially gaining access to sensitive information without authorization. This vulnerability exists in Fortinet’s FortiOS and FortiProxy SSL-VPN products, affecting versions 6.0.0 through 6.0.4, version 5.6.3 through 5.6.7 and versions 5.4.6 through 5.4.12. Hence, any organization or government body running any of these versions is vulnerable to this attack.
Impact on Government, Critical Infrastructure, and Manufacturing Sectors
Fortinet has confirmed that the vulnerability might have been exploited in attacks conducted by threat actors. They used the security flaw to launch cybersecurity attacks on crucial infrastructures, manufacturing firms, and government institutions. The industries that have been targeted by the attackers include critical infrastructures such as energy, banking, and finance, healthcare, and other government-backed institutions. This means that the vulnerability can cause significant damage to any organization or sector that depends on stable information systems to run operations smoothly.
Immediate Patching and Fortinet’s Response
The vulnerability has already been patched, so organizations are required to update their systems immediately to stay protected. Fortinet has also released a security advisory offering full guidance to its users to aid with updating and protecting systems. Users should always update their software to the latest versions and avoid downloading suspicious emails or websites. Fortinet is committed to providing users with suitable solutions to keep their information safe and secure.
A newly patched critical flaw has been discovered in FortiOS and FortiProxy that could lead to remote code execution. The vulnerability has been attributed to a heap-based buffer overflow that might have
been exploited in a limited number of cases that targeted government, manufacturing, and critical infrastructure sectors such as banking, energy, and finance, among others. Immediate patching is required to stay safe. Fortinet has provided guidance and support for its users to help update and protect their systems. Stay safe out there and update your systems, people!Original Article: https://thehackernews.com/2023/06/critical-fortios-and-fortiproxy.html