描述:
Fortinet 发布了安全公告,以应对 Fortinet 系统的多个漏洞。攻击者可以向受影响的系统传送特制的请求,从而发动攻击。
有报告指 FortiOS 及 FortiProxy 的权限提升漏洞 (CVE-2024-55591) 正受到攻击。系统管理员及用户应立即为受影响的系统安装修补程式,以减低受到网络攻击的风险。
受影响的系统:
- FortiAnalyzer
- FortiAP
- FortiClientEMS
- FortiClientWindows
- FortiManager
- FortiOS
- FortiProxy
- FortiWeb
有关受影响产品的详细资料、 请参阅供应商网站的相应安全公告中有关 “Affected Products” 的部分。
影响:
成功利用漏洞可以在受影响的系统导致远端执行程式码、服务被拒绝、权限提升、泄漏资讯、绕过保安限制、仿冒诈骗或篡改。
建议:
适用于受影响系统的修补程式已可获取。受影响系统的系统管理员应遵从供应商的建议,立即採取行动以降低风险。
进一步资讯:
- https://fortiguard.fortinet.com/psirt/FG-IR-23-405
- https://fortiguard.fortinet.com/psirt/FG-IR-23-407
- https://fortiguard.fortinet.com/psirt/FG-IR-23-458
- https://fortiguard.fortinet.com/psirt/FG-IR-23-476
- https://fortiguard.fortinet.com/psirt/FG-IR-24-097
- https://fortiguard.fortinet.com/psirt/FG-IR-24-106
- https://fortiguard.fortinet.com/psirt/FG-IR-24-135
- https://fortiguard.fortinet.com/psirt/FG-IR-24-143
- https://fortiguard.fortinet.com/psirt/FG-IR-24-152
- https://fortiguard.fortinet.com/psirt/FG-IR-24-216
- https://fortiguard.fortinet.com/psirt/FG-IR-24-221
- https://fortiguard.fortinet.com/psirt/FG-IR-24-222
- https://fortiguard.fortinet.com/psirt/FG-IR-24-239
- https://fortiguard.fortinet.com/psirt/FG-IR-24-259
- https://fortiguard.fortinet.com/psirt/FG-IR-24-266
- https://fortiguard.fortinet.com/psirt/FG-IR-24-282
- https://fortiguard.fortinet.com/psirt/FG-IR-24-326
- https://fortiguard.fortinet.com/psirt/FG-IR-24-463
- https://fortiguard.fortinet.com/psirt/FG-IR-24-535
- https://www.hkcert.org/tc/security-bulletin/fortinet-products-multiple-vulnerabilities_20250115
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46715
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21758
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23106
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26012
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32115
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33502
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35273
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35277
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36512
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46662
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46665
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46668
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46670
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47571
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48884
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50564
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50566
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54021
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55591