First published: Thu Feb 08 2024(Updated: )
A out-of-bounds write vulnerability [CWE-787] in FortiOS and FortiProxy may allow a remote unauthenticated attacker to execute arbitrary code or command via specially crafted HTTP requests. Workaround : disable SSL VPN (disable webmode is NOT a valid workaround) Note: This is potentially being exploited in the wild.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.2 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.6 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.13 | |
Fortinet FortiOS IPS Engine | >=6.4.0<=6.4.14 | |
Fortinet FortiOS IPS Engine | >=6.2.0<=6.2.15 | |
Fortinet FortiOS IPS Engine | >=6.0.0<=6.0.17 | |
Fortinet FortiProxy | >=7.4.0<=7.4.2 | |
Fortinet FortiProxy | >=7.2.0<=7.2.8 | |
Fortinet FortiProxy | >=7.0.0<=7.0.14 | |
Fortinet FortiProxy | >=2.0.0<=2.0.13 | |
Fortinet FortiProxy | >=1.2 | |
Fortinet FortiProxy | >=1.1 | |
Fortinet FortiProxy | >=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-24-015 vulnerability is classified as a critical security issue that can allow remote unauthenticated attackers to execute arbitrary code.
To mitigate FG-IR-24-015, upgrade to the appropriate FortiOS or FortiProxy versions as specified in the advisory.
The FG-IR-24-015 vulnerability affects FortiOS and FortiProxy versions from 7.4.0 to 7.4.2, and other specified versions down to 6.0.0.
Yes, FG-IR-24-015 can be exploited remotely via specially crafted HTTP requests.
A temporary workaround for FG-IR-24-015 is to disable the SSL VPN, as disabling web mode is not a valid solution.