Fortinet Family (FortiOS, FortiProxy, FortiClientLinux, FortiSandbox) Security Update Recommendations
Overview
We have released security updates to fix vulnerabilities in the Fortinet family of products. users of affected products are advised to update to the latest version.
Affected Products
CVE-2023-41677
- FortiOS versions 7.4.0 through 7.4.1
- FortiOS versions 7.2.0 through 7.2.6
- FortiOS versions 7.0.0 through 7.0.12
- FortiOS versions 6.4.0 through 6.4.14
- FortiOS 6.2.0 through 6.2.15
- All versions of FortiOS 6.0.x
- FortiProxy versions 7.4.0 through 7.4.1
- Versions of FortiProxy 7.2.0 through 7.2.7
- Versions of FortiProxy 7.0.0 through 7.0.13
- All versions of FortiProxy 2.0.x
- All versions of FortiProxy 1.2.x
- All versions of FortiProxy 1.1.x
- All versions of FortiProxy 1.0.x
CVE-2023-45590
- FortiClientLinux 7.2.0 versions
- Versions of FortiClientLinux 7.0.6 through 7.0.10
- FortiClientLinux versions 7.0.3 through 7.0.4
CVE-2024-23671
- FortiSandbox versions 4.4.0 through 4.4.3
- FortiSandbox versions 4.2.0 through 4.2.6
- FortiSandbox versions 4.0.0 through 4.0.6
Cve-2024-21755, cve-2024-21756
- FortiSandbox versions 4.4.0 through 4.4.3
- FortiSandbox versions 4.2.0 through 4.2.6
- FortiSandbox versions 4.0.0 through 4.0.4
Resolved Vulnerabilities
Vulnerability in FortiOS and FortiProxy due to insufficiently protected credentials that could allow administrator cookies to be obtained over SSL-VPN (CVE-2023-41677)
Arbitrary code execution vulnerability due to improper code injection vulnerability in FortiClientLinux (CVE-2023-45590)
Arbitrary file deletion vulnerability via HTTP request due to a directory path traversal vulnerability in FortiSandbox (CVE-2024-23671)
OS command vulnerability in FortiSandbox that could allow unauthorized command execution via crafted requests (CVE-2024-21755, CVE-2024-21756)
Vulnerability Patches
vulnerability Patches have been made available in the latest updates. Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.
CVE-2023-41677
- Upgrade to at least 7.4.2 on FortiOS 7.4 versions
- FortiOS 7.2 versions to at least 7.2.7
- FortiOS 7.0 version to at least 7.0.13 or later
- Upgrade from a FortiOS 6.4 version to at least a 6.4.15 version
- Upgrade from FortiOS 6.2 to a version of 6.2.16 or later
- Upgrade from FortiProxy 7.4.0 to at least 7.4.2
- FortiProxy 7.2.0 version to at least 7.2.8 or later
- FortiProxy 7.0.0 version to at least 7.0.14 or later
CVE-2023-45590
- Upgrade to at least 7.2.1 of FortiClientLinux 7.2 version
- Upgrade to at least 7.0.11 on FortiClientLinux 7.0 versions
CVE-2024-23671
- FortiSandbox 4.4 versions to at least 4.4.4
- FortiSandbox 4.2 versions to at least 4.2.7
- FortiSandbox 4.0 version to at least 4.0.5 or later
Cve-2024-21755, cve-2024-21756
- Upgrade to at least 4.4.4 on FortiSandbox 4.4 versions
- FortiSandbox 4.2 version to at least 4.2.7 or later
- FortiSandbox 4.0 versions to at least 4.0.5 or later
Referenced Sites
[1] FortiOS & FortiProxy – administrator cookie leakage
https://www.fortiguard.com/psirt/FG-IR-23-493
[2] [FortiClient Linux] Remote Code Execution due to dangerous ELECTRONJS configuration
https://www.fortiguard.com/psirt/FG-IR-23-087
[3] FortiSandbox – Arbitrary file delete on endpoint
https://www.fortiguard.com/psirt/FG-IR-23-454
[4] FortiSandbox – OS command injection on endpoint