描述:
Fortinet 發布了安全公告,以應對 Fortinet 系統的多個漏洞。攻擊者可以向受影響的系統傳送特製的請求,從而發動攻擊。
有報告指 FortiOS 及 FortiProxy 的權限提升漏洞 (CVE-2024-55591) 正受到攻擊。系統管理員及用戶應立即為受影響的系統安裝修補程式,以減低受到網絡攻擊的風險。
受影響的系統:
- FortiAnalyzer
- FortiAP
- FortiClientEMS
- FortiClientWindows
- FortiManager
- FortiOS
- FortiProxy
- FortiWeb
有關受影響產品的詳細資料、 請參閱供應商網站的相應安全公告中有關 “Affected Products” 的部分。
影響:
成功利用漏洞可以在受影響的系統導致遠端執行程式碼、服務被拒絕、權限提升、泄漏資訊、繞過保安限制、仿冒詐騙或篡改。
建議:
適用於受影響系統的修補程式已可獲取。受影響系統的系統管理員應遵從供應商的建議,立即採取行動以降低風險。
進一步資訊:
- https://fortiguard.fortinet.com/psirt/FG-IR-23-405
- https://fortiguard.fortinet.com/psirt/FG-IR-23-407
- https://fortiguard.fortinet.com/psirt/FG-IR-23-458
- https://fortiguard.fortinet.com/psirt/FG-IR-23-476
- https://fortiguard.fortinet.com/psirt/FG-IR-24-097
- https://fortiguard.fortinet.com/psirt/FG-IR-24-106
- https://fortiguard.fortinet.com/psirt/FG-IR-24-135
- https://fortiguard.fortinet.com/psirt/FG-IR-24-143
- https://fortiguard.fortinet.com/psirt/FG-IR-24-152
- https://fortiguard.fortinet.com/psirt/FG-IR-24-216
- https://fortiguard.fortinet.com/psirt/FG-IR-24-221
- https://fortiguard.fortinet.com/psirt/FG-IR-24-222
- https://fortiguard.fortinet.com/psirt/FG-IR-24-239
- https://fortiguard.fortinet.com/psirt/FG-IR-24-259
- https://fortiguard.fortinet.com/psirt/FG-IR-24-266
- https://fortiguard.fortinet.com/psirt/FG-IR-24-282
- https://fortiguard.fortinet.com/psirt/FG-IR-24-326
- https://fortiguard.fortinet.com/psirt/FG-IR-24-463
- https://fortiguard.fortinet.com/psirt/FG-IR-24-535
- https://www.hkcert.org/tc/security-bulletin/fortinet-products-multiple-vulnerabilities_20250115
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46715
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21758
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23106
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26012
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32115
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33502
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35273
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35277
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36512
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46662
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46665
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46668
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46670
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47571
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48884
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50564
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50566
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54021
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55591