• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
fortinet warns of active exploitation of new ssl vpn pre auth rce

Fortinet Warns of Active Exploitation of New SSL-VPN Pre-auth RCE Vulnerability

You are here: Home / General Cyber Security News / Fortinet Warns of Active Exploitation of New SSL-VPN Pre-auth RCE Vulnerability
December 13, 2022

Fortinet on Monday issued emergency patches for a extreme security flaw affecting its FortiOS SSL-VPN products that it stated is remaining actively exploited in the wild.

Tracked as CVE-2022-42475 (CVSS rating: 9.3), the critical bug relates to a heap-dependent buffer overflow vulnerability that could permit an unauthenticated attacker to execute arbitrary code by using specifically crafted requests.

The firm mentioned it can be “aware of an instance where by this vulnerability was exploited in the wild,” urging customers to shift rapidly to use the updates.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


CyberSecurity

The following solutions are impacted by the issue –

  • FortiOS version 7.2. by 7.2.2
  • FortiOS model 7.. by 7..8
  • FortiOS edition 6.4. by 6.4.10
  • FortiOS model 6.2. by way of 6.2.11
  • FortiOS-6K7K edition 7.. by 7..7
  • FortiOS-6K7K variation 6.4. through 6.4.9
  • FortiOS-6K7K model 6.2. as a result of 6.2.11
  • FortiOS-6K7K version 6.. by 6..14

Patches are out there in FortiOS versions 7.2.3, 7..9, 6.4.11, and 6.2.12 as very well as FortiOS-6K7K variations 7..8, 6.4.10, 6.2.12, and 6..15.

SSL-VPN Pre-auth RCE Vulnerability

The American network security business has also posted indicators of compromise (IoCs) affiliated with the exploitation attempts, like the IP addresses and the artifacts that are current in the file system article a successful attack.

The advisory arrives two months after Fortinet warned of energetic weaponization of one more critical authentication bypass bug in FortiOS, FortiProxy, and FortiSwitchManager (CVE-2022-40684, CVSS rating: 9.6).

Discovered this article attention-grabbing? Stick to us on Twitter  and LinkedIn to browse a lot more exclusive articles we put up.


Some elements of this article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News HSE Cyber-Attack Costs Ireland $83m So Far
Next Post: Malware Strains Targeting Python and JavaScript Developers Through Official Repositories malware strains targeting python and javascript developers through official repositories»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • WhatsApp Unveils Proxy Support to Tackle Internet Censorship
  • Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub
  • Blind Eagle Hacking Group Targets South America With New Tools
  • US Family Planning Non-Profit MFHS Confirms Ransomware Attack
  • Microsoft Reveals Tactics Used by 4 Ransomware Families Targeting macOS
  • Dridex Malware Now Attacking macOS Systems with Novel Infection Method
  • Cyber attacks on UK organisations surged 77% in 2022, new research finds
  • WhatsApp to combat internet blackouts with proxy server support
  • The IT Pro Podcast: Going passwordless
  • Podcast transcript: Going passwordless

Copyright © TheCyberSecurity.News, All Rights Reserved.