Skip to main content
Creating a new NHS England: Health Education England, NHS Digital and NHS England have merged. More about the merger.

Fortinet Releases Multiple Security Advisories

The security advisories address two critical, two high, one medium and two low vulnerabilities impacting FortiClient, FortiGate and FortiSIEM

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

The security advisories address two critical, two high, one medium and two low vulnerabilities impacting FortiClient, FortiGate and FortiSIEM


Threat details

Introduction

Fortinet has released security advisories to address multiple vulnerabilities.

The vulnerabilities vary in type and consist of two critical, two high, one medium and two low vulnerabilities impacting FortiClient, FortiGate and FortiSIEM.


Vulnerability details

  • CVE-2023-38545 - CWE-122 - Heap-based Buffer Overflow

This vulnerability, which has been assigned a CVSSv3 score of 9.8, is a heap-based buffer overflow vulnerability impacting both libcurl and curl, and may allow an attacker to perform remote code execution.

  • CVE-2023-38546 CWE-565 - Reliance on Cookies without Validation and Integrity Checking

This vulnerability, which has been assigned a CVSSv3 score of 3.7, is a cookie injection vulnerability affecting curl packages, and could allow an attacker to insert cookies into a running program using libcurl if the specific series of conditions are met.

  • CVE-2023-41840 CWE-426 - Untrusted Search Path

This vulnerability, which has been assigned a CVSSv3 score of 7.8, is an untrusted search path vulnerability impacting FortiClient Windows, and may allow an attacker to perform a DLL hijack.

  • CVE-2022-40681 CWE-863 - Incorrect Authorisation

This vulnerability, which has been assigned a CVSSv3 score of 7.1, is an incorrect authorisation vulnerability impacting FortiClient Windows, and may allow an attacker to perform arbitrary file deletion or denial of service.

  • CVE-2023-36553 - CWE-78 - Improper Neutralisation of Special Elements used in an OS Command ('OS Command Injection')

This vulnerability, which has been assigned a CVSSv3 score of 9.3, is an improper neutralisation of special elements used in an OS command vulnerability in FortiSIEM, and may allow a remote unauthenticated attacker to execute unauthorised commands via crafted API requests.

  • CVE-2023-41676 - CWE-200 - Exposure of Sensitive Information to an Unauthorised Actor

This vulnerability, which has been assigned a CVSSv3 score of 4.2, is an exposure of sensitive information to an unauthorised actor vulnerability in FortiSIEM, and may allow an attacker with access to windows agent logs to obtain the windows agent password via searching through the logs.

  • CVE-2023-45585 - CWE-532 - Insertion of Sensitive Information into Log File

This vulnerability, which has been assigned a CVSSv3 score of 2.1, is an insertion of sensitive information into log file vulnerability in FortiSIEM, and may allow an authenticated user to view an encrypted ElasticSearch password via debug log files generated when FortiSIEM is configured with ElasticSearch Event Storage.

Proof-of-concept available for CVE-2023-38545

A public proof of concept has been released for CVE-2023-38545.


Threat updates

Date Update
16 Nov 2023 Three vulnerabilities disclosed in FortiSIEM

The cyber alert has been updated to reflect this change.


Remediation advice

Affected organisations are encouraged to review the following Fortinet Security Advisories and apply the relevant updates.   



CVE Vulnerabilities

Last edited: 16 November 2023 4:08 pm