Cybersecurity

New Vulnerabilities Disclosed in SonicWall and Fortinet Network Security Products

[ad_1]

July 13, 2023thnNetwork Security / Vulnerabilities

SonicWall and Fortinet Network Security

SonicWall on Wednesday urged its Global Management System (GMS) firewall management customers and Network Analytics reporting engine software to apply hotfixes to secure against 15 security flaws that threat actors can exploit to circumvent authentication and access sensitive information.

Of the 15 deficiencies (traced from CVE-2023-34123 to CVE-2023-34137), four are rated Critical, four are rated High, and seven are rated Moderate in severity. The vulnerability was disclosed by the NCC Group.

The flaw affects on-premises versions of GMS 9.3.2-SP1 and earlier and Analytics 2.5.0.4-R7 and earlier. The fix is ​​available in GMS version 9.3.3 and Analytics 2.5.2.

“This set of vulnerabilities allows attackers to view data they would normally not be able to retrieve,” SonicWall said. “This may include data belonging to other users, or any other data to which the application itself has access. In many cases, an attacker can modify or delete this data, causing persistent changes to the content or behavior of the application.”

The list of critical flaws is as follows –

  • CVE-2023-34124 (CVSS Score: 9.4) – Web Service Authentication Bypass
  • CVE-2023-34133 (CVSS Score: 9.8) – Some Unauthenticated SQL Injection Issues and Security Filter Bypass
  • CVE-2023-34134 (CVSS Score: 9.8) – Password Hash Read via Web Service
  • CVE-2023-34137 (CVSS Score: 9.4) – Cloud App Security (CAS) Authentication Bypass.

The disclosure comes as Fortinet discloses a critical weakness affecting FortiOS and FortiProxy (CVE-2023-33308, CVSS score: 9.8) that could allow adversaries to achieve remote code execution under certain circumstances. It says the issue was resolved in a previous release, without advisors.

“A stack-based overflow vulnerability (CWE-124) in FortiOS and FortiProxy allowed a remote attacker to execute arbitrary code or commands through crafted packets reach proxy policies or firewall policies with shared proxy mode packet inspection in SSL,” the company said in an advisory.

UPCOMING WEBINARS

Protecting Against Insider Threats: SaaS Master Security Posture Management

Worried about insider threats? We are here to help you! Join this webinar to explore practical strategies and secrets to proactive security with SaaS Security Posture Management.

Join today

The affected products include FortiOS versions 7.2.0 through 7.2.3 and 7.0.0 through 7.0.10 and FortiProxy versions 7.2.0 through 7.2.2 and 7.0.0 through 7.0.9. Versions that clog security holes are listed below –

  • FortiOS version 7.4.0 or higher
  • FortiOS version 7.2.4 or higher
  • FortiOS version 7.0.11 or higher
  • FortiProxy version 7.2.3 or higher, and
  • FortiProxy version 7.0.10 or higher

It should be noted that the flaw does not affect all versions of FortiOS 6.0, FortiOS 6.2, and FortiOS 6.4, as well as FortiProxy 1.x and FortiProxy 2.x.

For customers who can’t apply updates right away, Fortinet is the solution recommend that they disable HTTP/2 support on the SSL checking profile used by proxy policies or firewall policies with proxy mode.

Found this article interesting? Follow us on Twitter And LinkedIn to read more exclusive content we post.



[ad_2]

Source link

Related Articles

Back to top button