• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new vulnerabilities disclosed in sonicwall and fortinet network security products

New Vulnerabilities Disclosed in SonicWall and Fortinet Network Security Products

You are here: Home / General Cyber Security News / New Vulnerabilities Disclosed in SonicWall and Fortinet Network Security Products
July 13, 2023

SonicWall on Wednesday urged customers of Worldwide Management Process (GMS) firewall management and Analytics network reporting engine program to utilize the newest fixes to secure versus a established of 15 security flaws that could be exploited by a threat actor to circumvent authentication and obtain delicate information and facts.

Of the 15 shortcomings (tracked from CVE-2023-34123 through CVE-2023-34137), 4 are rated Critical, 4 are rated Significant, and 7 are rated Medium in severity. The vulnerabilities ended up disclosed by NCC Team.

The flaws impression on-premise versions of GMS 9.3.2-SP1 and before and Analytics 2.5..4-R7 and just before. Fixes are offered in versions GMS 9.3.3 and Analytics 2.5.2.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“The suite of vulnerabilities lets an attacker to view information that they are not generally in a position to retrieve,” SonicWall explained. “This could possibly consist of facts belonging to other customers, or any other info that the application itself is ready to accessibility. In several instances, an attacker can modify or delete this data, triggering persistent alterations to the application’s content or actions.”

The listing of critical flaws is as follows –

  • CVE-2023-34124 (CVSS rating: 9.4) – Web Service Authentication Bypass
  • CVE-2023-34133 (CVSS rating: 9.8) – Various Unauthenticated SQL Injection Issues and Security Filter Bypass
  • CVE-2023-34134 (CVSS score: 9.8) – Password Hash Examine through Web Service
  • CVE-2023-34137 (CVSS rating: 9.4) – Cloud Application Security (CAS) Authentication Bypass

The disclosure arrives as Fortinet disclosed a critical flaw influencing FortiOS and FortiProxy (CVE-2023-33308, CVSS rating: 9.8) that could permit an adversary to reach distant code execution beneath selected situation. It mentioned the issue was solved in a preceding release, with no an advisory.

“A stack-based overflow vulnerability [CWE-124] in FortiOS and FortiProxy may perhaps enable a distant attacker to execute arbitrary code or command through crafted packets achieving proxy guidelines or firewall insurance policies with proxy mode together with SSL deep packet inspection,” the firm stated in an advisory.

Future WEBINARShield Against Insider Threats: Learn SaaS Security Posture Administration

Fearful about insider threats? We have got you included! Be part of this webinar to discover practical strategies and the strategies of proactive security with SaaS Security Posture Administration.

Join Nowadays

Impacted goods consist of FortiOS variations 7.2. by 7.2.3 and 7.. through 7..10 as perfectly as FortiProxy variations 7.2. by means of 7.2.2 and 7.. by way of 7..9. The variations that plug the security hole are stated beneath –

  • FortiOS model 7.4. or above
  • FortiOS variation 7.2.4 or higher than
  • FortiOS model 7..11 or over
  • FortiProxy edition 7.2.3 or above, and
  • FortiProxy version 7..10 or previously mentioned

It’s truly worth noting that the flaw does not influence all variations of FortiOS 6., FortiOS 6.2, and FortiOS 6.4, and FortiProxy 1.x and FortiProxy 2.x.

For consumers who simply cannot implement the updates straight away, Fortinet is recommending that they disable HTTP/2 guidance on SSL inspection profiles made use of by proxy insurance policies or firewall policies with proxy method.

Found this report appealing? Observe us on Twitter  and LinkedIn to read through extra exclusive content material we write-up.


Some elements of this article are sourced from:
thehackernews.com

Previous Post: «ransomware extortion skyrockets in 2023, reaching $449.1 million and counting Ransomware Extortion Skyrockets in 2023, Reaching $449.1 Million and Counting
Next Post: U.S. Government Agencies’ Emails Compromised in China-Backed Cyber Attack u.s. government agencies' emails compromised in china backed cyber attack»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.