Security updates: Malicious code attacks on the FortiDeceptor early warning system possible

Source: Heise.de added 08th Jan 2021

  • security-updates:-malicious-code-attacks-on-the-fortideceptor-early-warning-system-possible

Attackers could attack Fortinet protection software due to several security holes and, in the worst case, execute their own commands. Secure versions are available for download.

FortiDeceptor is affected, among others. With the protection solution, you can set traps for attackers in networks and, in the best case, detect threats early.

The most dangerous is one with the threat level ” high “classified vulnerability (CVE – 2020 – 29017) in FortiDeceptor. According to a warning message, a remote attacker would need to be authenticated for a successful attack. If this is the case, he could start at the customization page in a way that is not described in detail and execute his own commands in the system.

In contrast, the versions FortiDeceptor 3.0.2 , 3.1.1 and 3.2.0 . All previous editions are under threat, according to Fortinet.

Other vulnerabilities FortiWeb is vulnerable to four vulnerabilities (CVE- 2020 – 29015 , CVE – 2020 – 29016, CVE – 2020 – 29018, CVE – 2020 – 29019) vulnerable. All gaps are classified as ” medium “. If attacks are successful, attackers could paralyze systems via DoS attacks or even execute malicious code. Fortinet provides further information on possible attacks in the security warnings linked below this message.

Admins should ensure that they are using the patched versions FortiWeb 6.2.4 , 6.3.6 or 6.3.8 installed.

Another loophole with the threat level ” medium ” (CVE – 2020 – 2020) concerns FortiGate SSL VPN. Here remote authenticated attackers could access log entries and see, for example, IP addresses and user names.

To prevent this, the developers have the versions FortiGate 6.0. 11 , 6.2.5 and 6.4.2 published.

List sorted in descending order by threat level:

FortiDeceptor is impacted by an OS command injection vulnerability FortiWeb is vulnerable to a blind SQL injection Stack-Based Buffer Overflow vulnerability in FortiWeb FortiWeb is vulnerable to a buffer overflow FortiWeb is vulnerable to a Format string vulnerability FortiGate SSL VPN logs may display events of users in a different VDOM (of)

Read the full article at Heise.de

brands: 11  Best  CODE  other  
media: Heise.de  
keywords: OS  Software  

Related posts


Notice: Undefined variable: all_related in /var/www/vhosts/rondea.com/httpdocs/wp-content/themes/rondea-2-0/single-article.php on line 88

Notice: Undefined variable: all_related in /var/www/vhosts/rondea.com/httpdocs/wp-content/themes/rondea-2-0/single-article.php on line 88

Related Products



Notice: Undefined variable: all_related in /var/www/vhosts/rondea.com/httpdocs/wp-content/themes/rondea-2-0/single-article.php on line 91

Warning: Invalid argument supplied for foreach() in /var/www/vhosts/rondea.com/httpdocs/wp-content/themes/rondea-2-0/single-article.php on line 91