Rewterz Threat Alert – MuddyWater APT – Active IOCs
March 14, 2024Rewterz Threat Advisory – Multiple Intel Products Vulnerabilities
March 14, 2024Rewterz Threat Alert – MuddyWater APT – Active IOCs
March 14, 2024Rewterz Threat Advisory – Multiple Intel Products Vulnerabilities
March 14, 2024Severity
High
Analysis Summary
CVE-2023-42790 CVSS:9.8
Fortinet FortiOS and FortiProxy are vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the captive portal. By sending specially crafted HTTP requests, a remote attacker could overflow a buffer and execute arbitrary code on the system.
CVE-2024-23112 CVSS:8
Fortinet FortiOS and FortiProxy could allow a remote authenticated attacker to bypass security restrictions, caused by a flaw in the SSLVPN component. By sending a specially crafted URL request, an attacker could exploit this vulnerability to gain access to another user’s bookmark.
CVE-2023-42789 CVSS:9.8
Fortinet FortiOS and FortiProxy could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write flaw. By sending specially crafted HTTP requests, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2023-36554 CVSS:8.1
Fortinet FortiManager could allow a remote attacker to execute arbitrary code on the system, caused by improper access control. By sending specially crafted requests, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2023-47534 CVSS:9.6
Fortinet FortiClientEMS could allow a remote attacker to execute arbitrary commands on the system, caused by improper neutralization of formula elements in a CSV File. By persuading a victim to open a specially crafted CSV file, an attacker could exploit this vulnerability to execute arbitrary commands on the system.
CVE-2023-48788 CVSS:9.8
Fortinet FortiClientEMS is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database.
Impact
- Gain Access
- Code Execution
- Buffer Overflow
- Security Bypass
- Data Manipulation
Indicators Of Compromise
CVE
- CVE-2023-42790
- CVE-2024-23112
- CVE-2023-42789
- CVE-2023-36554
- CVE-2023-47534
- CVE-2023-48788
Affected Vendors
Fortinet
Affected Products
- Fortinet FortiManager 6.2.1
- Fortinet FortiClientEMS 6.4
- Fortinet FortiOS 7.2.0
- Fortinet FortiOS 7.0.0
- Fortinet FortiProxy 7.0.0
- Fortinet FortiOS 6.4.0
- Fortinet FortiProxy 2.0.0
- Fortinet FortiOS 6.2.0
- Fortinet FortiManager 6.4.0
- Fortinet FortiProxy 7.2.0
- Fortinet FortiManager 7.2.0
- Fortinet FortiClientEMS 6.2
- Fortinet FortiClientEMS 7.0.0
- Fortinet FortiOS 7.4.0
- Fortinet FortiOS 7.2.5
- Fortinet FortiOS 7.0.12
- Fortinet FortiManager 7.4.0
- Fortinet FortiManager 7.2.3
- Fortinet FortiOS 7.4.1
- Fortinet FortiProxy 7.4.0
- Fortinet FortiOS 6.2.15
- Fortinet FortiOS 6.4.14
- Fortinet FortiProxy 2.0.13
- Fortinet FortiProxy 7.0.12
- Fortinet FortiProxy 7.2.6
- Fortinet FortiManager 7.0
- Fortinet FortiManager 6.4.13
- Fortinet FortiManager 7.0.10
- Fortinet FortiClientEMS 7.0.1
- Fortinet FortiClientEMS 7.0.10
- Fortinet FortiClientEMS 7.2.0
- Fortinet FortiClientEMS 7.2.2
- Fortinet FortiClientEMS 6.0
Remediation
Refer to FortiGuard Advisory for patch, upgrade or suggested workaround information.