Fortinet Identifies Severe SQL Injection Vulnerability In FortiClientEMS Software
Fortinet recently issued a warning highlighting a critical vulnerability
The company stated, “An improper neutralization of special elements used in a SQL Command (‘SQL Injection’) vulnerability [CWE-89] in FortiClientEMS may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted requests”.
The vulnerability, assigned CVE-2023-48788, carries a substantial CVSS score of 9.3 out of 10, indicating its severe impact. It affects the following versions of FortiClientEMS:
Horizon3.ai has stated that this flaw could potentially lead to remote code execution
Thiago Santana, a member of the FortiClientEMS development team, along with the U.K. National Cyber Security Centre (NCSC), discovered the vulnerability and promptly reported it to Fortinet.
Furthermore, Fortinet addressed two additional significant bugs in FortiOS and FortiProxy (CVE-2023-42789 and CVE-2023-42790, both with CVSS scores of 9.3). These vulnerabilities could potentially allow attackers to execute arbitrary code or commands via specially crafted HTTP requests within the captive portal.
领英推荐
The following versions of the product have been identified with issues:
While there’s currently no evidence of active exploitation of the vulnerabilities mentioned above, it’s crucial to acknowledge that threat actors have historically targeted unpatched Fortinet appliances for malicious purposes. Therefore, it is imperative for users to prioritize obtaining the necessary updates without delay. Acting swiftly to install these updates can significantly mitigate the risk of potential security breaches