The Download
CISA reported active exploitation of a critical remote code execution (RCE) vulnerability in Fortinet devices, tracked as CVE-2024-23113. The flaw exists in Fortinet’s SSL VPN, allowing attackers to gain unauthorized access and execute arbitrary code remotely. Once exploited, attackers can fully control vulnerable systems, compromise data, install malware, and launch further attacks across a network, making it a significant security concern for organizations relying on Fortinet products.
What You Can Do
The flaw affects FortiOS 7.0, FortiPAM 1.0+, FortiProxy 7.0 and FortiWeb 7.4. IT administrators should immediately patch all affected Fortinet devices with the latest security updates released by the vendor. Beyond updating systems, administrators should ensure that VPN services are only accessible through trusted networks and use multifactor authentication (MFA) to secure access.
Scan your network attack surfaces from the outside to behind the firewall with ThreatMate.
To Learn More: