Fortinet issues a critical alert regarding a severe SQL injection vulnerability found in its FortiClientEMS software, potentially allowing attackers to execute unauthorized code. Tracked as CVE-2023-48788 and rated 9.3 on the CVSS scale, the flaw affects multiple versions of the software, necessitating immediate action to prevent exploitation. The company credits Thiago Santana from the FortiClientEMS development team and the U.K. National Cyber Security Centre (NCSC) for discovering and reporting the vulnerability, highlighting collaborative efforts in cybersecurity.
Additionally, Fortinet addresses two other critical vulnerabilities in FortiOS and FortiProxy, with CVE-2023-42789 and CVE-2023-42790, respectively. These vulnerabilities could enable attackers to execute arbitrary code via specially crafted HTTP requests, emphasizing the importance of comprehensive security updates. While there is no evidence of active exploitation, Fortinet underscores the urgency of patching unaddressed vulnerabilities, given the history of threat actors targeting unpatched Fortinet appliances.
The comprehensive list of impacted product versions underscores the widespread nature of the vulnerabilities across Fortinet’s product portfolio, necessitating a coordinated response from users to apply the necessary updates promptly. As unpatched vulnerabilities pose a significant risk to organizational security, timely patching is crucial to mitigating potential threats and safeguarding against exploitation. Fortinet’s proactive disclosure and patching efforts demonstrate a commitment to addressing security vulnerabilities promptly and effectively in collaboration with the cybersecurity community.