КућаЦИИ/ОТExploit for Fortinet Critical RCE Bug Allows SIEM Root Access

Exploit for Fortinet Critical RCE Bug Allows SIEM Root Access

Објављено на

spot_img

A critical vulnerability in Fortinet’s FortiSIEM product has recently been exploited, raising concerns about potential widespread attacks targeting enterprise cybersecurity operations centers.

The vulnerability, known as CVE-2024-23108, was identified and addressed by Fortinet back in February, along with another related bug, CVE-2024-23109. Both vulnerabilities have received a maximum severity rating of 10 on the CVSS scale, indicating the serious nature of the security flaws. These vulnerabilities are classified as unauthenticated command injection flaws, which could allow threat actors to execute remote code by crafting malicious API requests.

Researchers at Horizon3AI have created a proof-of-concept exploit named “NodeZero” for CVE-2024-23108. This exploit enables malicious users to execute commands as root on vulnerable FortiSIEM appliances. In their demonstration, researchers successfully loaded a remote-access tool for post-exploitation activities, highlighting the potential for threat actors to gain unauthorized access to sensitive systems.

FortiSIEM serves as Fortinet’s security information and event management (SIEM) platform, essential for managing cybersecurity operations in various organizations. Any compromise of this platform could provide malicious actors with a strong foothold to launch further attacks within corporate networks, potentially leading to significant data breaches and disruptions in operations.

The affected versions of FortiSIEM include 7.1.0 through 7.1.1; 7.0.0 through 7.0.2; 6.7.0 through 6.7.8; 6.6.0 through 6.6.3; 6.5.0 through 6.5.2; and 6.4.0 through 6.4.2. To mitigate the risk of exploitation, users are strongly advised to apply the latest patches and updates provided by Fortinet.

The emergence of a proof-of-concept exploit for this critical vulnerability underscores the importance of proactive cybersecurity measures and prompt patching of known vulnerabilities. Enterprises must remain vigilant and implement robust security protocols to safeguard their systems and data from potential threats. Additionally, ongoing monitoring and threat intelligence sharing can help organizations stay ahead of emerging cyber threats and protect against malicious activities that target critical infrastructure and sensitive information.

In conclusion, the disclosure of this vulnerability in FortiSIEM serves as a stark reminder of the persistent cybersecurity risks faced by organizations in today’s digital landscape. By staying informed, actively addressing vulnerabilities, and adopting a proactive approach to cybersecurity, businesses can enhance their resilience against evolving threats and minimize the potential impact of security breaches.

Извор линк

Најновији чланци

ESET denies compromise of Israel branch amidst targeted attacks – The Register

ESET, a prominent cybersecurity company, has firmly denied any involvement in a recent wiper...

Microsoft’s failure to collect critical security logs puts customers at risk

Microsoft recently faced a setback in its security monitoring capabilities, as a logging failure...

New Sextortion Protection Measures Introduced by Instagram

Meta's Instagram has recently introduced new security measures to protect its users from sextortion...

The Rapidly Evolving Global Threat Landscape

Microsoft has revealed a staggering statistic that its customers are being targeted by over...

Више овако

ESET denies compromise of Israel branch amidst targeted attacks – The Register

ESET, a prominent cybersecurity company, has firmly denied any involvement in a recent wiper...

Microsoft’s failure to collect critical security logs puts customers at risk

Microsoft recently faced a setback in its security monitoring capabilities, as a logging failure...

New Sextortion Protection Measures Introduced by Instagram

Meta's Instagram has recently introduced new security measures to protect its users from sextortion...
sr_RSSerbian