Fortinet Security Update – 13 November 2024

Fortinet has released security updates to fix multiple vulnerabilities across several Fortinet products.

The addressed vulnerabilities could allow the attacker to bypass security restrictions, gain elevated privileges, obtain sensitive information, or execute arbitrary code and gain access to the affected systems.

Sample of the addressed vulnerabilities:

1. Fortinet FortiClient Windows Privilege Escalation Vulnerability (CVE-2024- 36513):

  • CVSS: 7.4
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: Required
  • Consequences: Privilege Escalation

2. Fortinet FortiOS SSL VPN Session Hijacking Vulnerability (CVE-2023-50176):

  • CVSS: 7.1
  • Attack Vector: Network
  • Attack Complexity: High
  • Privileges Required: None
  • User Interaction: Required
  • Consequences: Session Hijacking

Sample of the affected products:

  • FortiPortal.
  • FortiManager.
  • FortiOS.
  • FortiProxy.
  • FortiAnalyzer.
  • FortiClientWindows.
  • FortiAnalyzer-BigData.
Vulnerabilities
  • CVE-2024-40590
  • CVE-2024-31496
  • CVE-2024-33510
  • CVE-2024-23666
  • CVE-2024-36513
  • CVE-2024-35274
  • CVE-2024-32116
  • CVE-2024-32118
  • CVE-2024-47574
  • CVE-2023-44255
  • CVE-2023-47543
  • CVE-2024-33505
  • CVE-2023-50176
  • CVE-2024-26011
  • CVE-2024-40592
  • CVE-2024-36509
  • CVE-2024-32117
  • CVE-2024-36507
Mitigations

The enterprise should deploy this patch as soon as the testing phase is completed.

Fortinet Security Update

References