Security News > 2024 > February > Fortinet's week to forget: Critical vulns, disclosure screw-ups, and that toothbrush DDoS attack claim
The only workaround recommended by Fortinet is to disable the SSL VPN. Disabling webmode won't mitigate the vulnerability, it said.
Firstly, Fortinet backtracked and said these weren't vulnerabilities at all, instead explaining that they were issued in error and were duplicates of the single vulnerability mentioned in the aforementioned October advisory - CVE-2023-34992.
Due to exceptional circumstances that include the premature dissemination of mitigation guidance and in an effort to help protect our customers, Fortinet distributed its monthly advisory on February 8 ahead of its anticipated February 13 publication date to provide important details to customers considering these circumstances.
For more on Fortinet's responsible disclosure process, visit the Fortinet Product Security Incident Response Team.
The reporter at the Swiss German daily which originally reported the story then snapped back with a comeback that refuted Fortinet's response, saying: "What the Fortinet headquarters in California is now calling a 'translation problem' sounded completely different during the research: Swiss Fortinet representatives described the toothbrush case as a real DDoS at a meeting that discussed current threats."
The Swiss reporter also said the article was proofread by Fortinet before publication and nothing in the report was corrected by the vendor.
News URL
https://go.theregister.com/feed/www.theregister.com/2024/02/09/a_look_at_fortinet_week/
Related news
- FBI: Critical infrastructure suffers spike in ransomware attacks (source)
- JetBrains TeamCity under attack by ransomware thugs after disclosure mess (source)
- Critical Fortinet flaw may impact 150,000 exposed devices (source)
- Fortinet warns of critical RCE bug in endpoint management software (source)
- Public anxiety mounts over critical infrastructure resilience to cyber attacks (source)
- More than 133,000 Fortinet appliances still vulnerable to month-old critical bug (source)
- Exploit released for Fortinet RCE bug used in attacks, patch now (source)
- CISA: Here’s how you can foil DDoS attacks (source)
- US sanctions APT31 hackers behind critical infrastructure attacks (source)
- Crafting Shields: Defending Minecraft Servers Against DDoS Attacks (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-10-10 | CVE-2023-34992 | OS Command Injection vulnerability in Fortinet Fortisiem A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiSIEM version 7.0.0 and 6.7.0 through 6.7.5 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 allows attacker to execute unauthorized code or commands via crafted API requests. | 9.8 |