Security News > 2024 > February > Fortinet's week to forget: Critical vulns, disclosure screw-ups, and that toothbrush DDoS attack claim
The only workaround recommended by Fortinet is to disable the SSL VPN. Disabling webmode won't mitigate the vulnerability, it said.
Firstly, Fortinet backtracked and said these weren't vulnerabilities at all, instead explaining that they were issued in error and were duplicates of the single vulnerability mentioned in the aforementioned October advisory - CVE-2023-34992.
Due to exceptional circumstances that include the premature dissemination of mitigation guidance and in an effort to help protect our customers, Fortinet distributed its monthly advisory on February 8 ahead of its anticipated February 13 publication date to provide important details to customers considering these circumstances.
For more on Fortinet's responsible disclosure process, visit the Fortinet Product Security Incident Response Team.
The reporter at the Swiss German daily which originally reported the story then snapped back with a comeback that refuted Fortinet's response, saying: "What the Fortinet headquarters in California is now calling a 'translation problem' sounded completely different during the research: Swiss Fortinet representatives described the toothbrush case as a real DDoS at a meeting that discussed current threats."
The Swiss reporter also said the article was proofread by Fortinet before publication and nothing in the report was corrected by the vendor.
News URL
https://go.theregister.com/feed/www.theregister.com/2024/02/09/a_look_at_fortinet_week/
Related news
- CISA warns of critical Palo Alto Networks bug exploited in attacks (source)
- Critical Veeam RCE bug now used in Frag ransomware attacks (source)
- Critical bug in EoL D-Link NAS devices now exploited in attacks (source)
- Palo Alto Networks warns of critical RCE zero-day exploited in attacks (source)
- Critical RCE bug in VMware vCenter Server now exploited in attacks (source)
- Oracle warns of Agile PLM file disclosure flaw exploited in attacks (source)
- Fortinet VPN design flaw hides successful brute-force attacks (source)
- CISA Urges Agencies to Patch Critical "Array Networks" Flaw Amid Active Attacks (source)
- Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks (source)
- Zabbix urges upgrades after critical SQL injection bug disclosure (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-10-10 | CVE-2023-34992 | OS Command Injection vulnerability in Fortinet Fortisiem A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.7.5 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via crafted API requests. | 9.8 |