Open Nav
Sign Up

FortiOS and FortiProxy Vulnerability

Critical Vulnerability - FortiOS and FortiProxy Vulnerability

Bar Refael

January 10, 2024

Based on a recent advisory from the Cybersecurity and Infrastructure Security Agency (CISA), Fortinet has released a crucial security update to address a vulnerability in FortiOS and FortiProxy software. This update is a preventative measure against potential cyber threats that could exploit this vulnerability to gain control of affected systems.

Vulnerability Details:

  • Type: Improper Privilege Management Vulnerability [CWE-269]
  • Affected Software: FortiOS and FortiProxy
  • Impact: An authenticated attacker may exploit this vulnerability to perform unauthorized actions in a High Availability (HA) cluster via crafted HTTP or HTTPS requests.

Affected Versions and Solutions:

  • FortiOS 7.4: Versions 7.4.0 through 7.4.1 should upgrade to 7.4.2 or above.
  • FortiOS 7.2: Version 7.2.5 should upgrade to 7.2.6 or above.
  • FortiProxy 7.4: Versions 7.4.0 through 7.4.1 should upgrade to 7.4.2 or above.
  • Upgrade Assistance: Use Fortinet’s upgrade tool at https://docs.fortinet.com/upgrade-tool.
  • Virtual Patch: “FortiOS.HA.RestAPI.Authentication.Bypass” available in FMWP db update 23.104.

CISA Advisory:

CISA urges users and administrators to review the FG-IR-23-315 FortiOS & FortiProxy security bulletin and apply necessary updates to mitigate the risk effectively.

OP Innovate Recommendations:

  • Update Systems: Ensure affected versions of FortiOS and FortiProxy are updated as per guidelines.
  • Apply Virtual Patch: If immediate upgrade is not feasible, utilize the virtual patch provided.
  • Enhanced Monitoring: Post-upgrade, monitor systems for any signs of security breaches or unusual activities.
  • Stay Informed: Keep abreast of updates from Fortinet and ongoing advisories from CISA.

This vulnerability in FortiOS and FortiProxy underlines the importance of timely updates and cybersecurity vigilance. OP Innovate emphasizes the need for quick action in line with CISA’s advisory and is dedicated to supporting our customers through these updates.

Resources highlights

Critical Zero-Day in Microsoft SharePoint Actively Exploited (CVE-2025-53770)

A newly discovered zero-day vulnerability in Microsoft SharePoint Server, tracked as CVE-2025-53770, is currently being exploited in active attacks against on-premises environments. The flaw, rated…

Read more >

CVE-2025-53770

Over 600 Laravel Applications Vulnerable to Remote Code Execution via Leaked APP_KEYs (CVE-2018-15133, CVE-2024-55556)

Security researchers have uncovered a major RCE threat affecting over 600 Laravel applications, triggered by leaked APP_KEYs found on public GitHub repositories. Laravel's APP_KEY, typically…

Read more >

CVE-2018-15133, CVE-2024-55556

CVE-2025-3648: “Count(er) Strike” Vulnerability in ServiceNow

CVE-2025-3648, dubbed “Count(er) Strike”, is a high-severity vulnerability (CVSS 8.2) in ServiceNow's Now Platform, discovered by Varonis Threat Labs. The flaw allows both authenticated and…

Read more >

CVE-2025-3648

What to Look for in a Pentesting Platform (Beyond Just Scans)

Penetration testing platforms are a great way to centralize vulnerability discovery and triage. However, when evaluating penetration testing platforms, many organizations make the mistake of…

Read more >

pentesting platform

CVE-2016-10033: Actively Exploited Remote Code Execution (RCE) Vulnerability in PHPMailer

CVE-2016-10033 is a critical remote code execution vulnerability in PHPMailer, a widely used PHP library for sending emails. The flaw lies in the mailSend function…

Read more >

CVE-2016-10033

High-Severity WordPress Vulnerability in Forminator Plugin (CVE-2025-6463)

A critical vulnerability in the Forminator plugin, one of the most popular form-building plugins in Wordpress, allows unauthenticated attackers to delete arbitrary files on the…

Read more >

CVE-2025-6463
Under Cyber Attack?

Fill out the form and we will contact you immediately.