描述:
FortiNet 发布了保安建议以应对 FortiOS软件的多个漏洞。攻击者可以向受影响的系统系统传送特制的请求,从而攻击这些漏洞。
受影响的系统:
- FortiADC
- FortiAnalyzer
- FortiClient
- FortiClientMac
- FortiDeceptor
- FortiEDR CollectorWindows
- FortiMail
- FortiManager
- FortiOS
- FortiSIEM
- FortiSOAR
- 有关受影响产品的详细资料,请参阅供应商网站的相应安全公告中有关 “Affected Products” 的部分。
影响:
成功利用这些漏洞可以在受影响的系统上导致插入任意指令码、跨网址程式编程、服务受阻断、泄漏资讯、绕过保安限制或篡改,视乎攻击者利用哪个漏洞而定。
建议:
现已有适用于受影响系统的软件更新。受影响系统的管理员应遵从产品供应商的建议,立即採取行动以降低风险。
进一步资讯:
- https://www.fortiguard.com/psirt/FG-IR-21-228
- https://www.fortiguard.com/psirt/FG-IR-22-064
- https://www.fortiguard.com/psirt/FG-IR-22-066
- https://www.fortiguard.com/psirt/FG-IR-22-070
- https://www.fortiguard.com/psirt/FG-IR-22-074
- https://www.fortiguard.com/psirt/FG-IR-22-174
- https://www.fortiguard.com/psirt/FG-IR-22-216
- https://www.fortiguard.com/psirt/FG-IR-22-218
- https://www.fortiguard.com/psirt/FG-IR-22-223
- https://www.fortiguard.com/psirt/FG-IR-22-228
- https://www.fortiguard.com/psirt/FG-IR-22-232
- https://www.fortiguard.com/psirt/FG-IR-22-234
- https://www.fortiguard.com/psirt/FG-IR-22-246
- https://www.fortiguard.com/psirt/FG-IR-22-283
- https://www.fortiguard.com/psirt/FG-IR-22-314
- https://www.fortiguard.com/psirt/FG-IR-22-331
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26122
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30307
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33870
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33878
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35842
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35851
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38372 (to CVE-2022-38374)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38380 (to CVE-2022-38381)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39945
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39949 (to CVE-2022-38950)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42473