Open Nav
Sign Up

FortiOS and FortiProxy Vulnerability

Critical Vulnerability - FortiOS and FortiProxy Vulnerability

Bar Refael

January 10, 2024

Based on a recent advisory from the Cybersecurity and Infrastructure Security Agency (CISA), Fortinet has released a crucial security update to address a vulnerability in FortiOS and FortiProxy software. This update is a preventative measure against potential cyber threats that could exploit this vulnerability to gain control of affected systems.

Vulnerability Details:

  • Type: Improper Privilege Management Vulnerability [CWE-269]
  • Affected Software: FortiOS and FortiProxy
  • Impact: An authenticated attacker may exploit this vulnerability to perform unauthorized actions in a High Availability (HA) cluster via crafted HTTP or HTTPS requests.

Affected Versions and Solutions:

  • FortiOS 7.4: Versions 7.4.0 through 7.4.1 should upgrade to 7.4.2 or above.
  • FortiOS 7.2: Version 7.2.5 should upgrade to 7.2.6 or above.
  • FortiProxy 7.4: Versions 7.4.0 through 7.4.1 should upgrade to 7.4.2 or above.
  • Upgrade Assistance: Use Fortinet’s upgrade tool at https://docs.fortinet.com/upgrade-tool.
  • Virtual Patch: “FortiOS.HA.RestAPI.Authentication.Bypass” available in FMWP db update 23.104.

CISA Advisory:

CISA urges users and administrators to review the FG-IR-23-315 FortiOS & FortiProxy security bulletin and apply necessary updates to mitigate the risk effectively.

OP Innovate Recommendations:

  • Update Systems: Ensure affected versions of FortiOS and FortiProxy are updated as per guidelines.
  • Apply Virtual Patch: If immediate upgrade is not feasible, utilize the virtual patch provided.
  • Enhanced Monitoring: Post-upgrade, monitor systems for any signs of security breaches or unusual activities.
  • Stay Informed: Keep abreast of updates from Fortinet and ongoing advisories from CISA.

This vulnerability in FortiOS and FortiProxy underlines the importance of timely updates and cybersecurity vigilance. OP Innovate emphasizes the need for quick action in line with CISA’s advisory and is dedicated to supporting our customers through these updates.

Resources highlights

Salesforce Breach: Exposure of Support Case Data at Major Security Vendors

A large-scale supply-chain campaign has unfolded, where attackers abused OAuth tokens from Salesloft’s Drift application to infiltrate Salesforce environments. Among the confirmed victims are leading…

Read more >

salesforce breach

CVE-2025-55177: WhatsApp Authorization Flaw Exploited in Zero-Click Spyware Chain

WhatsApp has patched CVE-2025-55177, an authorization flaw in its linked-device synchronization feature that was exploited in the wild.  While Meta originally rated it medium severity,…

Read more >

CVE-2025-55177

Docker Issues Patch for Critical Exploit in Docker Desktop: CVE-2025-9074

On August 20, 2025, Docker released an urgent patch for CVE-2025-9074, a critical Server-Side Request Forgery (SSRF) vulnerability (CVSS 9.3) affecting Docker Desktop for Windows…

Read more >

CVE-2025-9074

CVE-2025-48384: Git Submodule Path Flaw Exploited in the Wild

CVE-2025-48384 is a client-side Git vulnerability that lets a malicious repository abuse a mismatch in how Git reads vs. writes configuration values containing a trailing…

Read more >

CVE-2025-48384

CVE-2025-43300: Apple ImageIO Zero-Day Exploited in Targeted Attacks

Apple patched CVE-2025-43300, a zero-day in the ImageIO framework used system-wide to read/write many image formats. Opening or previewing a malicious image can corrupt memory…

Read more >

CVE-2025-43300

CVE-2025-57790: Commvault Path Traversal Vulnerability Leads to RCE

On August 19th, Commvault published advisory CV_2025_08_2 for a newly-discovered path traversal flaw in the Web Server component that allows remote attackers to perform unauthorized…

Read more >

CVE-2025-57790
Under Cyber Attack?

Fill out the form and we will contact you immediately.