Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Fortinet launches critical security patch for FortiClientLinux vulnerability
    Cyber Security

    Fortinet launches critical security patch for FortiClientLinux vulnerability

    techempireBy techempire5 Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportApril 11, 2024Editorial DepartmentVulnerability/Threat Mitigation

    flying tower

    Fortinet has released a patch to address a critical security vulnerability affecting FortiClientLinux that could be exploited to achieve arbitrary code execution.

    This vulnerability is numbered CVE-2023-45590 and has a CVSS score of 9.4 out of 10.

    “Code Generation Improper Control (“Code Injection”) Vulnerability [CWE-94] Fortinet stated in the announcement that “FortinetLinux” in FortinetLinux could allow an unauthenticated attacker to execute arbitrary code by tricking FortiClientLinux users into accessing a malicious website.

    Internet security

    The flaw, described as a situation where remote code execution occurs due to a “dangerous Nodejs configuration”, affects the following versions –

    • FortiClientLinux versions 7.0.3 to 7.0.4 and 7.0.6 to 7.0.10 (upgrade to 7.0.11 or later)
    • FortiClientLinux version 7.2.0 (upgrade to 7.2.1 or later)

    Security researcher CataLpa from Dbappsecurity is credited with discovering and reporting the vulnerability.

    Fortinet’s April 2024 security patch also resolves an issue in the FortiClientMac installer that could also lead to code execution (CVE-2023-45588 and CVE-2024-31492, CVSS score: 7.8).

    Also resolved is a FortiOS and FortiProxy bug that could leak administrator cookies under certain circumstances (CVE-2023-41677, CVSS score: 7.5).

    While there is no evidence that any of the flaws are widely exploited, users are advised to keep their systems up to date to mitigate potential threats.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Pokémon Trading Card Website Making 100k!

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    GTA 6 Release Date

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.