https://ift.tt/prcPCqG How To Prepare For Your Virtual Doctor Visit To Get The Most From Your Consultation
https://ift.tt/prcPCqG How To Prepare For Your Virtual Doctor Visit To Get The Most From Your Consultation
- Get link
- X
- Other Apps
Fortinet has disclosed multiple stack-based buffer overflow vulnerabilities (CVE-2024-23110) in FortiOS’s command line interpreter.
These vulnerabilities could allow authenticated attackers to execute unauthorized code or commands. Gwendal Guégniaud of the Fortinet Product Security team discovered and reported these vulnerabilities.
The vulnerabilities affect several versions of FortiOS. Fortinet has provided the following guidance for affected users:
Fortinet recommends using its upgrade path tool to ensure a smooth transition to the fixed versions. The tool can be accessed at Fortinet’s Upgrade Path Tool.
The vulnerabilities are due to improper handling of command-line arguments in the FortiOS command-line interpreter.
Free Webinar on API vulnerability scanning for OWASP API Top 10 vulnerabilities -> Book Your Spot.
An attacker with authenticated access could exploit these vulnerabilities by sending specially crafted command-line arguments, which could lead to the execution of unauthorized code or commands.
Fortinet advises all users of affected FortiOS versions to upgrade to the recommended versions as soon as possible to mitigate the risk of exploitation.
Users should also follow best practices for network security, including limiting access to the command line interface to trusted users and monitoring for unusual activity.
Log into your FortiGate device to check the current FortiOS version.
Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free
The post FortiOS Vulnerability Let Attackers to Execute Unauthorized Commands appeared first on Cyber Security News.
Comments
Post a Comment
Commenter vous !