24h | 7d | 30d

Overview

  • Fortinet
  • FortiPAM

11 Mar 2025
Published
12 Mar 2025
Updated

CVSS v3.1
HIGH (7.0)
EPSS
0.04%

KEV

Description

A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.0 through 7.4.4, version 7.2.0 through 7.2.9, version 7.0.0 through 7.0.15 and before 6.4.15, FortiProxy version 7.4.0 through 7.4.6, version 7.2.0 through 7.2.12 and before 7.0.19, FortiPAM version 1.4.0 through 1.4.2 and before 1.3.1, FortiSRA version 1.4.0 through 1.4.2 and before 1.3.1 and FortiWeb version 7.4.0 through 7.4.5, version 7.2.0 through 7.2.10 and before 7.0.10 allows a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands.

Statistics

  • 1 Post

Fediverse

Profile picture

Fortinet risolve molteplici vulnerabilità in FortiOS e FortiSandbox

Fortinet ha rilasciato un importante aggiornamento di sicurezza che risolve diverse vulnerabilità in FortiSandbox, FortiOS e altri prodotti che potrebbero consentire agli aggressori l’accesso non autorizzato o l’esecuzione di comandi.

  • Le vulnerabilità critiche identificate in FortiSandbox e FortiOS potrebbero causare l’esecuzione di comandi non autorizzati.
  • I problemi più gravi includono l’iniezione di comandi del sistema operativo e i rischi di autorizzazione errata.
  • I prodotti interessati sono disponibili in diverse versioni e richiedono aggiornamenti immediati per motivi di sicurezza.

Fortinet ha riconosciuto gravi vulnerabilità nei principali prodotti di sicurezza, tra cui FortiSandbox e FortiOS, con implicazioni che potrebbero esporre le organizzazioni a significativi rischi per la sicurezza.

In particolare, la vulnerabilità di command injection del sistema operativo ad alta gravità in FortiSandbox (CVE-2024-52961) consente agli aggressori di eseguire comandi arbitrari sfruttando la funzionalità di download della macchina virtuale, il che potrebbe portare a un accesso non autorizzato al sistema.

Una neutralizzazione impropria di elementi speciali utilizzati in una vulnerabilità del comando del sistema operativo [CWE-78] in Fortinet FortiSandbox versione 5.0.0, da 4.4.0 a 4.4.7, da 4.2.0 a 4.2.7 e prima della 4.0.5 consente a un aggressore autenticato con almeno l’autorizzazione di sola lettura di eseguire comandi non autorizzati tramite richieste contraffatte.

Un altro difetto ad alta gravità riguarda un’autorizzazione errata (CVE-2024-45328) che potrebbe consentire agli utenti con privilegi bassi di ottenere l’accesso alle funzioni amministrative, esponendo le operazioni sensibili a potenziali usi impropri.

Oltre a questi problemi, vulnerabilità come format string e SQL injection (CVE-2024-45324 e CVE-2024-33501) sono presenti anche in più prodotti, consentendo crash delle applicazioni o esecuzioni di comandi non autorizzati.

La portata e la gravità di queste vulnerabilità evidenziano l’importanza di un’azione immediata da parte degli utenti dei prodotti Fortinet per implementare le patch e gli aggiornamenti necessari, disponibili tramite il Product Security Incident Response Team (PSIRT) dedicato di Fortinet. Le organizzazioni devono dare priorità a questi aggiornamenti per mitigare il potenziale sfruttamento da parte di attori malintenzionati.

Fortinet consiglia vivamente ai clienti di eseguire l’aggiornamento alle versioni più recenti dei prodotti interessati, come indicato negli avvisi di sicurezza. Le organizzazioni che utilizzano FortiOS, FortiSandbox o altri prodotti interessati dovrebbero dare priorità a questi aggiornamenti in base ai livelli di gravità e alle configurazioni di distribuzione.

L'articolo Fortinet risolve molteplici vulnerabilità in FortiOS e FortiSandbox proviene da il blog della sicurezza informatica.

  • 0
  • 0
  • 3 hours ago

Overview

  • Rising Technosoft
  • CAP back office application

13 Mar 2025
Published
13 Mar 2025
Updated

CVSS v4.0
HIGH (8.2)
EPSS
0.04%

KEV

Description

This vulnerability exists in the CAP back office application due to improper authentication check at the API endpoint. An unauthenticated remote attacker with a valid login ID could exploit this vulnerability by manipulating API input parameters through API request URL/payload leading to unauthorized access to other user accounts.

Statistics

  • 1 Post
  • 1 Interaction

Fediverse

Profile picture

IDK what CAP Back Office is, I'm guessing it's some PoS ( hey, that works on multiple levels this time ) system. There are a few sev:HIGH CVEs for it so if it sounds familiar, you should probably take a look.

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 1
  • 21 hours ago

Overview

  • Rising Technosoft
  • CAP back office application

13 Mar 2025
Published
13 Mar 2025
Updated

CVSS v4.0
HIGH (8.2)
EPSS
0.04%

KEV

Description

This vulnerability exists in the CAP back office application due to missing rate limiting on OTP requests in an API endpoint. An authenticated remote attacker could exploit this vulnerability by sending multiple OTP request through vulnerable API endpoint which could lead to the OTP bombing/flooding on the targeted system.

Statistics

  • 1 Post
  • 1 Interaction

Fediverse

Profile picture

IDK what CAP Back Office is, I'm guessing it's some PoS ( hey, that works on multiple levels this time ) system. There are a few sev:HIGH CVEs for it so if it sounds familiar, you should probably take a look.

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 1
  • 21 hours ago

Overview

  • Rising Technosoft
  • CAP back office application

13 Mar 2025
Published
13 Mar 2025
Updated

CVSS v4.0
HIGH (8.2)
EPSS
0.04%

KEV

Description

This vulnerability exists in the CAP back office application due to improper implementation of OTP verification mechanism in its API based login. A remote attacker with valid credentials could exploit this vulnerability by manipulating API request URL/payload. Successful exploitation of this vulnerability could allow the attacker to bypass Two-Factor Authentication (2FA) for other user accounts.

Statistics

  • 1 Post
  • 1 Interaction

Fediverse

Profile picture

IDK what CAP Back Office is, I'm guessing it's some PoS ( hey, that works on multiple levels this time ) system. There are a few sev:HIGH CVEs for it so if it sounds familiar, you should probably take a look.

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 1
  • 21 hours ago

Overview

  • Rising Technosoft
  • CAP back office application

13 Mar 2025
Published
13 Mar 2025
Updated

CVSS v4.0
HIGH (8.2)
EPSS
0.04%

KEV

Description

This vulnerability exists in the CAP back office application due to improper authorization checks on certain API endpoints. An authenticated remote attacker could exploit this vulnerability by manipulating API request URL to gain unauthorized access to other user accounts.

Statistics

  • 1 Post
  • 1 Interaction

Fediverse

Profile picture

IDK what CAP Back Office is, I'm guessing it's some PoS ( hey, that works on multiple levels this time ) system. There are a few sev:HIGH CVEs for it so if it sounds familiar, you should probably take a look.

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 1
  • 21 hours ago

Overview

  • Rising Technosoft
  • CAP back office application

13 Mar 2025
Published
13 Mar 2025
Updated

CVSS v4.0
HIGH (8.3)
EPSS
0.04%

KEV

Description

This vulnerability exists in the CAP back office application due to a weak password-reset mechanism implemented at API endpoints. An authenticated remote attacker with a valid login ID could exploit this vulnerability through vulnerable API endpoint which could lead to account takeover of targeted users.

Statistics

  • 1 Post
  • 1 Interaction

Fediverse

Profile picture

IDK what CAP Back Office is, I'm guessing it's some PoS ( hey, that works on multiple levels this time ) system. There are a few sev:HIGH CVEs for it so if it sounds familiar, you should probably take a look.

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 1
  • 21 hours ago
Showing 21 to 26 of 26 CVEs