描述:
Fortinet 发布了安全公告,以应对 Fortinet 产品的多个漏洞。攻击者可以向受影响的系统传送特制的请求,从而攻击这些漏洞。
有报告指FortiOS 及 FortiProxy 的一个远端执行程式码漏洞 (CVE-2023-27997) 正处于被攻击的高风险。系统管理员应立即为受影响的系统安装最新的修补程式,以减低受到网络攻击的风险。
受影响的系统:
- FortiADC
- FortiADC Manager
- FortiAnalyzer
- FortiClient (Windows)
- FortiConverter (Windows)
- FortiManager
- FortiNAC
- FortiOS
- FortiProxy
- FortiSIEM
- FortiSwitchManager
- FortiWeb
有关受影响产品的详细资料,请参阅供应商网站的相应保安建议中有关 “Affected Products” 的部分。
影响:
成功利用漏洞可以在受影响的系统上导致远端执行程式码、插入任意指令码、服务被拒绝、泄漏资讯、权限提升、绕过保安限制、仿冒诈骗或篡改,视乎攻击者利用哪个漏洞而定。
建议:
现已有适用于受影响系统的软件更新。受影响系统的管理员应遵从产品供应商的建议,立即採取行动以降低风险。
进一步资讯:
- https://www.fortiguard.com/psirt/FG-IR-21-141
- https://www.fortiguard.com/psirt/FG-IR-22-229
- https://www.fortiguard.com/psirt/FG-IR-22-258
- https://www.fortiguard.com/psirt/FG-IR-22-259
- https://www.fortiguard.com/psirt/FG-IR-22-332
- https://www.fortiguard.com/psirt/FG-IR-22-375
- https://www.fortiguard.com/psirt/FG-IR-22-380
- https://www.fortiguard.com/psirt/FG-IR-22-393
- https://www.fortiguard.com/psirt/FG-IR-22-455
- https://www.fortiguard.com/psirt/FG-IR-22-463
- https://www.fortiguard.com/psirt/FG-IR-22-468
- https://www.fortiguard.com/psirt/FG-IR-22-493
- https://www.fortiguard.com/psirt/FG-IR-22-494
- https://www.fortiguard.com/psirt/FG-IR-22-521
- https://www.fortiguard.com/psirt/FG-IR-23-076
- https://www.fortiguard.com/psirt/FG-IR-23-095
- https://www.fortiguard.com/psirt/FG-IR-23-097
- https://www.fortiguard.com/psirt/FG-IR-23-107
- https://www.fortiguard.com/psirt/FG-IR-23-111
- https://www.fortiguard.com/psirt/FG-IR-23-119
- https://www.fortiguard.com/psirt/FG-IR-23-125
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33877
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39946
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41327
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42474
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42478
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43949
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43953
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22633
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22639
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25609
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26204
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26207
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26210
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27997
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28000
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29175
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29178 (to CVE-2023-29181)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33305