描述:
FortiNet 發布了保安建議以應對 FortiOS軟件的多個漏洞。攻擊者可以向受影響的系統系統傳送特製的請求,從而攻擊這些漏洞。
受影響的系統:
- FortiADC
- FortiAnalyzer
- FortiClient
- FortiClientMac
- FortiDeceptor
- FortiEDR CollectorWindows
- FortiMail
- FortiManager
- FortiOS
- FortiSIEM
- FortiSOAR
- 有關受影響產品的詳細資料,請參閱供應商網站的相應安全公告中有關 “Affected Products” 的部分。
影響:
成功利用這些漏洞可以在受影響的系統上導致插入任意指令碼、跨網址程式編程、服務受阻斷、泄漏資訊、繞過保安限制或篡改,視乎攻擊者利用哪個漏洞而定。
建議:
現已有適用於受影響系統的軟件更新。受影響系統的管理員應遵從產品供應商的建議,立即採取行動以降低風險。
進一步資訊:
- https://www.fortiguard.com/psirt/FG-IR-21-228
- https://www.fortiguard.com/psirt/FG-IR-22-064
- https://www.fortiguard.com/psirt/FG-IR-22-066
- https://www.fortiguard.com/psirt/FG-IR-22-070
- https://www.fortiguard.com/psirt/FG-IR-22-074
- https://www.fortiguard.com/psirt/FG-IR-22-174
- https://www.fortiguard.com/psirt/FG-IR-22-216
- https://www.fortiguard.com/psirt/FG-IR-22-218
- https://www.fortiguard.com/psirt/FG-IR-22-223
- https://www.fortiguard.com/psirt/FG-IR-22-228
- https://www.fortiguard.com/psirt/FG-IR-22-232
- https://www.fortiguard.com/psirt/FG-IR-22-234
- https://www.fortiguard.com/psirt/FG-IR-22-246
- https://www.fortiguard.com/psirt/FG-IR-22-283
- https://www.fortiguard.com/psirt/FG-IR-22-314
- https://www.fortiguard.com/psirt/FG-IR-22-331
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26119
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26122
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30307
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33870
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33878
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35842
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35851
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38372 (to CVE-2022-38374)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38380 (to CVE-2022-38381)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39945
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39949 (to CVE-2022-38950)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42473