Skip to content

Commit

Permalink
Fortinet critical update (#1169)
Browse files Browse the repository at this point in the history
* Fortinet critical update

* Formatting
  • Loading branch information
ryan-aus authored Jan 16, 2025
1 parent 86b3d88 commit 5fb1cd1
Showing 1 changed file with 26 additions and 0 deletions.
26 changes: 26 additions & 0 deletions docs/advisories/20250116001-Fortinet-Critical-Update.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
# Fortinet Critical Update - 20250116001

## Overview

The WA SOC has been made aware of a hard-coded cryptographic key vulnerability in FortiSwitch that may allow a remote unauthenticated attacker in posession of the key to execute unauthorized code.

## What is vulnerable?

| Product(s) Affected | Version(s) | CVE | CVSS | Severity |
| ------------------- | ---------- | ---------------------------------------------------------------------------------------------------------------------------------------- | ------------ | -------------------------------------------------------------- |
| FortiSwitch | 7.4.0 <br> 7.2.0 - 7.2.5 <br> 7.0.0 - 7.0.7 <br> 6.4.0 - 6.4.13 <br> 6.2.0 - 6.2.7 <br> 6.0.0 - 6.0.7| [CVE-2023-37936](https://nvd.nist.gov/vuln/detail/CVE-2023-37936) | 9.8 | **Critical** |


## What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours:

- Fortinet: <https://fortiguard.fortinet.com/psirt/FG-IR-23-260>

## Additional References

- BleepingComputer: <https://www.bleepingcomputer.com/news/security/fortinet-warns-of-auth-bypass-zero-day-exploited-to-hijack-firewalls/>

0 comments on commit 5fb1cd1

Please sign in to comment.