Articles tagged "Fortinet"

Found 23 articles

Fortinet has released patches for several high-severity vulnerabilities that could allow attackers to execute commands and bypass authentication without needing to log in. These vulnerabilities pose a significant risk as they can be exploited remotely, potentially allowing unauthorized access to sensitive systems. Organizations using Fortinet products should prioritize applying these updates to protect their networks from potential attacks. The vulnerabilities impact a range of Fortinet's security products, and users are urged to ensure their systems are up to date. Ignoring these patches could leave systems vulnerable to exploitation by malicious actors.

Impact: Fortinet security products
Remediation: Fortinet has issued patches to address the vulnerabilities; users should update their systems with the latest versions as soon as possible.
Read Original

Last week, Microsoft addressed a serious vulnerability in its Office software, which was being actively exploited by attackers. This zero-day flaw could allow unauthorized access to user systems, putting sensitive information at risk. Users of Microsoft Office should ensure they install the latest updates to protect themselves from potential attacks. Additionally, Fortinet released patches for a flaw in its FortiCloud single sign-on (SSO) service, which could have allowed unauthorized access to user accounts. Organizations using FortiCloud should prioritize applying these updates to safeguard their systems from exploitation.

Impact: Microsoft Office, Fortinet FortiCloud
Remediation: Microsoft has released updates to fix the zero-day vulnerability in Office. Fortinet has issued patches for the FortiCloud SSO flaw.
Read Original

Fortinet has confirmed a new zero-day vulnerability that is allowing attackers to exploit single sign-on (SSO) authentication for malicious logins. In response to the ongoing attacks, the company has temporarily disabled FortiCloud SSO authentication across all devices to mitigate the risk. This means that users relying on this feature for secure access may face disruptions while Fortinet works on a solution. The situation is particularly concerning as it puts sensitive information at risk and could lead to unauthorized access to critical systems. Companies using Fortinet products should monitor the situation closely and be prepared to implement any updates once they are released.

Impact: FortiCloud SSO authentication
Remediation: Temporarily disabled FortiCloud SSO authentication for all devices
Read Original

Fortinet has issued patches for a serious vulnerability in its FortiOS software, identified as CVE-2026-24858, which has been actively exploited by attackers. This flaw allows unauthorized users to bypass Single Sign-On (SSO) authentication, posing a significant risk to organizations using affected systems. The vulnerability has a high CVSS score of 9.4, indicating its severity. It impacts several products, including FortiOS, FortiManager, and FortiAnalyzer. Companies utilizing these systems should prioritize applying the available patches to protect against potential breaches.

Impact: FortiOS, FortiManager, FortiAnalyzer
Remediation: Fortinet has started rolling out patches for CVE-2026-24858. Users are advised to apply these patches immediately to mitigate the risk of exploitation.
Read Original

Fortinet has addressed a significant vulnerability tracked as CVE-2026-24858, which could allow attackers to bypass authentication and gain unauthorized access to devices linked to other FortiCloud accounts. This flaw presents a serious risk, as it enables malicious actors to potentially control devices that should be secure. Users and organizations utilizing FortiCloud services are particularly affected, as their account security could be compromised. Fortinet's swift action to patch this vulnerability is crucial to prevent exploitation and protect users' sensitive data. Companies using Fortinet products should ensure they apply the latest updates to mitigate this risk effectively.

Impact: FortiCloud services, devices registered to FortiCloud accounts.
Remediation: Fortinet has released patches to address the vulnerability. Users are advised to update their FortiCloud services and devices to the latest version as soon as possible.
Read Original

Arctic Wolf has reported a surge in automated attacks targeting Fortinet FortiGate devices, which has been ongoing since January 15, 2026. These attacks involve unauthorized changes to firewall configurations, with attackers creating generic accounts to maintain access, enabling VPN capabilities, and exfiltrating sensitive firewall data. This activity mirrors similar attacks identified in December 2025. Organizations using FortiGate firewalls should be vigilant, as these breaches can compromise network security and expose critical information. The situation emphasizes the need for enhanced security measures and monitoring to detect such unauthorized activities.

Impact: Fortinet FortiGate devices
Remediation: Organizations should implement strict access controls, regularly review firewall configurations, and monitor for unauthorized changes. Updating to the latest firmware and applying security patches as they are released is also recommended.
Read Original

This week, several significant cybersecurity incidents have emerged, showcasing the vulnerabilities within various systems. Notably, flaws in Fortinet products have come to light, potentially exposing users to exploitation. Additionally, researchers have identified the RedLine Clipjack malware, which can hijack browser sessions, affecting users who may not realize their data is being compromised. The discovery of a method to crack NTLM authentication raises concerns for organizations relying on this protocol, as it could lead to unauthorized access. Furthermore, a new attack targeting AI tools like Copilot illustrates how these advancements can be manipulated, posing risks to users and their data. These incidents emphasize the need for robust security measures as technology continues to evolve rapidly.

Impact: Fortinet products, NTLM authentication, AI tools like Copilot
Remediation: Users should apply the latest security updates from Fortinet, review authentication protocols, and implement additional security measures for AI tools.
Read Original

A serious vulnerability, identified as CVE-2025-64155, has been discovered in Fortinet’s FortiSIEM security platform, allowing unauthenticated remote attackers to execute unauthorized code. This flaw specifically affects the phMonitor service, which is crucial for the operation of FortiSIEM. The release of proof-of-concept (PoC) exploit code has heightened concerns, urging organizations using this software to apply patches immediately. If not addressed, this vulnerability could lead to significant security risks, as attackers could manipulate the system remotely. Organizations should prioritize patching their FortiSIEM deployments to safeguard against potential exploitation.

Impact: Fortinet FortiSIEM security platform
Remediation: Organizations should immediately apply patches provided by Fortinet for FortiSIEM to mitigate the vulnerability. Specific patch numbers or versions were not mentioned in the article, so users should check Fortinet's official site for the latest updates.
Read Original

A serious vulnerability has been discovered in Fortinet's Security Information and Event Management (SIEM) solution, FortiSIEM, which allows remote, unauthenticated attackers to execute arbitrary commands. This flaw, classified as a command injection vulnerability, poses a significant risk as it can be exploited without needing any prior access. Researchers have released technical details and exploit code, raising concerns about the potential for widespread attacks. Companies using FortiSIEM should take immediate action to secure their systems, as the implications of this vulnerability could lead to unauthorized access and data breaches. It's crucial for users to stay informed and apply any necessary patches or updates as they become available.

Impact: FortiSIEM
Remediation: Organizations should implement available patches and updates for FortiSIEM as soon as possible to mitigate the risk of exploitation.
Read Original

Fortinet has addressed six security flaws, two of which are critical vulnerabilities affecting its FortiFone and FortiSIEM products. These vulnerabilities could potentially allow attackers to exploit the systems without needing any authentication, which raises significant security concerns. Specifically, the flaws could lead to unauthorized access to configuration data or enable the execution of malicious code. Users of these products should prioritize applying the patches provided by Fortinet to safeguard their systems. Given the nature of these vulnerabilities, organizations using FortiFone and FortiSIEM need to act quickly to mitigate any potential risks.

Impact: FortiFone, FortiSIEM
Remediation: Fortinet has released patches to fix the vulnerabilities. Users are advised to apply these patches as soon as possible to prevent potential exploitation.
Read Original

Fortinet has addressed a severe vulnerability in its FortiSIEM product that could allow attackers to execute arbitrary code without authentication. This flaw, known as CVE-2025-64155, has a CVSS score of 9.4, highlighting its potential impact on affected systems. The vulnerability arises from improper handling of special elements in OS commands, which could be exploited by malicious actors. Organizations using FortiSIEM should prioritize applying the latest updates to protect their systems. The existence of such vulnerabilities emphasizes the need for ongoing vigilance in maintaining security protocols and software updates.

Impact: FortiSIEM
Remediation: Users should update to the latest version of FortiSIEM as released by Fortinet to mitigate this vulnerability.
Read Original

Over 10,000 Fortinet firewalls are currently at risk due to a two-factor authentication (2FA) bypass vulnerability that has been known for five years. This vulnerability allows attackers to exploit systems that have not implemented proper security measures, potentially granting them unauthorized access to sensitive data and networks. The issue is particularly pressing because it affects devices that are publicly accessible on the internet, increasing the likelihood of exploitation. Organizations using these firewalls need to act quickly to secure their systems and protect against potential breaches. It's crucial for users to verify their configurations and apply any available updates to mitigate this serious risk.

Impact: Fortinet firewalls, specifically those exposed to the internet and not patched against the 2FA bypass vulnerability.
Remediation: Organizations should immediately review their firewall configurations and apply any available security patches. Users are advised to disable the vulnerable 2FA feature if possible and ensure that their systems are not exposed to the internet without additional security measures. Regularly updating firmware and monitoring for unauthorized access attempts are also recommended.
Read Original

Fortinet has issued a warning about ongoing attacks that exploit an old vulnerability in its FortiOS software, identified as CVE-2020-12812. This flaw allows attackers to bypass two-factor authentication, which can significantly compromise the security of affected systems. Organizations using FortiOS should be particularly vigilant, as this vulnerability has resurfaced in active attacks. The potential for unauthorized access puts sensitive data at risk, making it critical for users to address this issue promptly. Cybersecurity teams are urged to review their systems and implement necessary updates to safeguard against these threats.

Impact: FortiOS versions that are vulnerable to CVE-2020-12812, particularly those configured with two-factor authentication.
Remediation: Users should apply the latest patches for FortiOS as provided by Fortinet. It is also recommended to review and strengthen two-factor authentication configurations and monitor system access logs for any suspicious activities.
Read Original

Fortinet has issued a warning about a vulnerability in FortiOS that has been around for five years but is still being exploited by attackers. This flaw allows unauthorized users to bypass two-factor authentication (2FA) on FortiGate firewalls, which are widely used by organizations to secure their networks. The continued exploitation of this vulnerability poses a significant risk to companies relying on these firewalls, as it can lead to unauthorized access and potential data breaches. Users of FortiGate firewalls are urged to take immediate action to protect their systems by applying available security updates. This situation serves as a reminder of the importance of keeping software up to date and addressing known vulnerabilities promptly.

Impact: FortiGate firewalls running FortiOS
Remediation: Users should apply the latest security patches from Fortinet to mitigate this vulnerability.
Read Original

Fortinet has alerted users about the active exploitation of a five-year-old vulnerability in its FortiOS SSL VPN, identified as CVE-2020-12812. This flaw, which has a CVSS score of 5.2, involves improper authentication and is particularly dangerous under specific configurations. Researchers have recently observed this vulnerability being abused in real-world attacks, which means organizations using affected versions of FortiOS SSL VPN should take immediate action to secure their systems. The ongoing exploitation of such an outdated vulnerability underscores the need for companies to regularly update their security measures and ensure proper configuration to protect against potential attacks.

Impact: FortiOS SSL VPN versions affected by CVE-2020-12812.
Remediation: Fortinet recommends updating to the latest version of FortiOS SSL VPN to mitigate this vulnerability. Users should also review their configurations to ensure that they are not exposing themselves to exploitation of this flaw.
Read Original
Page 1 of 2Next