{"id":28811,"date":"2023-02-18T11:34:48","date_gmt":"2023-02-18T10:34:48","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=28811"},"modified":"2023-02-18T11:34:48","modified_gmt":"2023-02-18T10:34:48","slug":"fortinet-fixes-critical-rce-vulnerabilities-in-fortinac-and-fortiweb","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2023\/02\/18\/fortinet-fixes-critical-rce-vulnerabilities-in-fortinac-and-fortiweb\/","title":{"rendered":"Fortinet fixes critical RCE vulnerabilities in FortiNAC and FortiWeb"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2023\/02\/18\/fortinet-behebt-kritische-rce-schwachstellen-in-fortinac-und-fortiweb\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Administrators of Fortinet's FortiNAC and FortiWeb need to take action. The vendor released a security advisory this week and fixed critical RCE vulnerabilities. The question that arises: Why only now, isn't the vulnerability CVE-2021-42756 probably known since 2021? Is there something being exploited in the wild? Here is some information about it.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg05.met.vgwort.de\/na\/dd9e9aa65914442cacc132214fac49ec\" alt=\"\" width=\"1\" height=\"1\" \/>I came across the issue in several places right away. In the following <a href=\"https:\/\/twitter.com\/Horizon3Attack\/status\/1626692778062237713\" target=\"_blank\" rel=\"noopener\">tweet<\/a>, the Horizon3 Attack Team points out the RCE vulnerability CVE-2022-39952, which allows an unauthenticated user to gain root user privileges in Fortinet FortiNAC.<\/p>\n<p><a href=\"https:\/\/twitter.com\/Horizon3Attack\/status\/1626692778062237713\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Fortinet FortiNAC RCE CVE-2022-39952\" src=\"https:\/\/i.imgur.com\/ssj0kTm.png\" alt=\"Fortinet FortiNAC RCE CVE-2022-39952\" \/><\/a><\/p>\n<p>And Will Dormann\u00a0raises in the following <a href=\"https:\/\/twitter.com\/wdormann\/status\/1626645015668703232\" target=\"_blank\" rel=\"noopener\">tweet<\/a> the question of why a security warning is coming now when CVE-2021-42756 was already assigned in 2021?<\/p>\n<p><a href=\"https:\/\/twitter.com\/wdormann\/status\/1626645015668703232\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"CVE-2021-42756 in Fortinet Fortigate\" src=\"https:\/\/i.imgur.com\/NYJZf14.png\" alt=\"CVE-2021-42756 in Fortinet Fortigate\" \/><\/a><\/p>\n<p>Fortigate has published security alert <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-22-300\" target=\"_blank\" rel=\"noopener\">FG-IR-22-300<\/a> (FortiNAC &#8211; External Control of File Name or Path in keyUpload scriptlet) for vulnerability <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-39952\">CVE-2022-39952<\/a> (CVSSv3 score 9.8, critical), writing that external control of the file name or path [CWE-73] in the FortiNAC web server could allow an unauthenticated attacker to perform arbitrary write operations on the system. This was uncovered by the internal security team. Affected are:<\/p>\n<ul>\n<li>FortiNAC version 9.4.0<\/li>\n<li>FortiNAC version 9.2.0 bis 9.2.5<\/li>\n<li>FortiNAC version 9.1.0 bis 9.1.7<\/li>\n<li>FortiNAC 8.8 all versions<\/li>\n<li>FortiNAC 8.7 all versions<\/li>\n<li>FortiNAC 8.6 all versions<\/li>\n<li>FortiNAC 8.5 all versions<\/li>\n<li>FortiNAC 8.3 all versions<\/li>\n<\/ul>\n<p>As a result, the vendor has released security updates; subsequent versions no longer contain the vulnerability.<\/p>\n<ul>\n<li>FortiNAC version 9.4.1 or higher<\/li>\n<li>FortiNAC version 9.2.6 or higher<\/li>\n<li>FortiNAC version 9.1.8 or higher<\/li>\n<li>FortiNAC version 7.2.0 or higher<\/li>\n<\/ul>\n<p>The colleagues at Bleeping Computer have addressed the issue in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fortinet-fixes-critical-rce-flaws-in-fortinac-and-fortiweb\/\" target=\"_blank\" rel=\"noopener\">this post<\/a>. There they also address the vulnerability <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-42756\" target=\"_blank\" rel=\"noopener\">CVE-2021-42756<\/a> (CVSS v3 score 9.3, critical) in FortiWeb (web application firewall).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Administrators of Fortinet's FortiNAC and FortiWeb need to take action. The vendor released a security advisory this week and fixed critical RCE vulnerabilities. The question that arises: Why only now, isn't the vulnerability CVE-2021-42756 probably known since 2021? Is there &hellip; <a href=\"https:\/\/borncity.com\/win\/2023\/02\/18\/fortinet-fixes-critical-rce-vulnerabilities-in-fortinac-and-fortiweb\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547,22],"tags":[2776,69,195],"class_list":["post-28811","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-update","tag-fortinet","tag-security","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/28811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=28811"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/28811\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=28811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=28811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=28811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}