TT-CSIRT – 440.09.04.25 – Fortinet Security Advisories

TT-CSIRT – 440.09.04.25 – Fortinet Security Advisories

Please be advised of the following critical alert regarding multiple vulnerabilities affecting various Fortinet products, including FortiOS, FortiProxy, FortiManager, FortiAnalyzer, FortiVoice, and FortiWeb. These vulnerabilities could allow an unauthenticated attacker in a man-in-the-middle (MITM) position to impersonate the management device. Organizations utilizing affected Fortinet versions are urged to take immediate action.

Impact: Successful exploitation of these vulnerabilities could allow an attacker to:

  • Gain unauthorized access to managed Fortinet devices.
  • Potentially modify configurations and policies.
  • Disrupt normal operations.
  • Compromise the security of the affected network.

Affected Versions:

VersionAffectedSolution
FortiAnalyzer 7.6Not affectedNot Applicable
FortiAnalyzer 7.47.4.0 through 7.4.2Upgrade to 7.4.3 or above
FortiAnalyzer 7.27.2.0 through 7.2.4Upgrade to 7.2.5 or above
FortiAnalyzer 7.07.0.0 through 7.0.11Upgrade to 7.0.12 or above
FortiAnalyzer 6.46.4.0 through 6.4.14Upgrade to 6.4.15 or above
FortiAnalyzer 6.26.2.0 through 6.2.13Upgrade to 6.2.14 or above
FortiManager 7.6Not affectedNot Applicable
FortiManager 7.47.4.0 through 7.4.2Upgrade to 7.4.3 or above
FortiManager 7.27.2.0 through 7.2.4Upgrade to 7.2.5 or above
FortiManager 7.07.0.0 through 7.0.11Upgrade to 7.0.12 or above
FortiManager 6.46.4.0 through 6.4.14Upgrade to 6.4.15 or above
FortiManager 6.26.2.0 through 6.2.13Upgrade to 6.2.14 or above
FortiOS 7.6Not affectedNot Applicable
FortiOS 7.47.4.0 through 7.4.4Upgrade to 7.4.5 or above
FortiOS 7.27.2.0 through 7.2.8Upgrade to 7.2.9 or above
FortiOS 7.07.0.0 through 7.0.15Upgrade to 7.0.16 or above
FortiOS 6.46.4 all versionsMigrate to a fixed release
FortiOS 6.26.2.0 through 6.2.16Upgrade to 6.2.17 or above
FortiProxy 7.6Not affectedNot Applicable
FortiProxy 7.47.4.0 through 7.4.2Upgrade to 7.4.3 or above
FortiProxy 7.27.2.0 through 7.2.9Upgrade to 7.2.10 or above
FortiProxy 7.07.0.0 through 7.0.15Upgrade to 7.0.16 or above
FortiProxy 2.02.0 all versionsMigrate to a fixed release
FortiVoice 7.2Not affectedNot Applicable
FortiVoice 7.07.0.0 through 7.0.2Upgrade to 7.0.3 or above
FortiVoice 6.46.4.0 through 6.4.8Upgrade to 6.4.9 or above
FortiVoice 6.06.0 all versionsMigrate to a fixed release
FortiWeb 7.6Not affectedNot Applicable
FortiWeb 7.47.4.0 through 7.4.2Upgrade to 7.4.3 or above
FortiWeb 7.27.2 all versionsMigrate to a fixed release
FortiWeb 7.07.0 all versionsMigrate to a fixed release

Recommendations:

TT-CSIRT strongly recommends that organizations using the identified vulnerable Fortinet products take the following immediate actions:

  • Upgrade Immediately: Upgrade all affected Fortinet products to the latest stable versions as recommended in the Fortinet advisory FG-IR-24-046. Refer to the Fortinet Security Bulletins for specific upgrade paths and recommended versions.
  • Review Network Controls: Ensure appropriate network segmentation and access controls are in place to limit the potential impact of a successful MITM attack.
  • Monitor for Suspicious Activity: Closely monitor network traffic and system logs for any unusual or suspicious activity that may indicate exploitation attempts.
  • Educate Personnel: Remind employees about the risks of social engineering and the importance of verifying the authenticity of communications, especially those involving administrative access or configuration changes.

References:

If you have any queries, comments or require assistance, please feel free to contact TT-CSIRT via contacts@ttcsirt.gov.tt