Description:
Fortinet released security advisories to address multiple vulnerabilities in Fortinet products. An attacker could exploit the vulnerabilities by sending specially crafted requests to an affected system.
Affected Systems:
- FortiOS version 6.0 all versions, version 6.2 all versions, version 6.4 all versions, version 7.0.0 through 7.0.12, version 7.2.0 through 7.2.5 and version 7.4.0
- FortiProxy 1.0 all versions, 1.1 all versions, 1.2 all versions, 2.0 all versions, 7.0 all versions and 7.2 all versions
- FortiClientWindows 6.0 all versions, 6.2 all versions, version 6.4.0 through 6.4.8, version 7.0.0 through 7.0.9 and version 7.2.0 through 7.2.1
- FortiMail 6.0 all versions, 6.2 all versions, 6.4 all versions, version 7.0.0 through 7.0.6, version 7.2.0 through 7.2.4 and version 7.4.0
- FortiGate with FGT_VM64_KVM model in use and authentication required: FGT_VM64_KVM version 7.0.1 through 7.0.13, FGT_VM64_KVM version 7.2.0 through 7.2.6 and FGT_VM64_KVM version 7.4.0 through 7.4.1
Impact:
Successful exploitation of the vulnerabilities could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security restriction bypass or tampering of affected system.
Recommendation:
Software updates for affected systems are now available. Administrators of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
More Information:
- https://www.fortiguard.com/psirt/FG-IR-22-299
- https://www.fortiguard.com/psirt/FG-IR-22-396
- https://www.fortiguard.com/psirt/FG-IR-23-108
- https://www.fortiguard.com/psirt/FG-IR-23-151
- https://www.fortiguard.com/psirt/FG-IR-23-203
- https://www.fortiguard.com/psirt/FG-IR-23-274
- https://www.fortiguard.com/psirt/FG-IR-23-287
- https://www.fortiguard.com/psirt/FG-IR-23-385
- https://www.hkcert.org/security-bulletin/fortinet-products-multiple-vulnerabilities_20231116
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40681
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28002
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33304
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36633
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36641
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545 (to CVE-2023-38546)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41840
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45582