--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Vulnerabilities in Fortinet products' number: '2024-036' version: '1.0' original_date: 'April 9, 2024' date: 'April 11, 2024' --- _History:_ * _11/04/2024 --- v1.0 -- Initial publication_ # Summary On April 11, 2024, Fortinet released multiple advisories regarding high and critical vulnerabilities affecting FortiOS, FortiProxy, FortiClient Mac and FortiClient Linux [1]. It is recommended upgrading affected software as soon as possible. # Technical Details The vulnerability **CVE-2023-45590** [2], with a CVSS score of 9.4, is due to an improper control of generation of code. It may allow an unauthenticated attacker to execute arbitrary code via tricking a FortiClientLinux user into visiting a malicious website. The vulnerabilities **CVE-2023-45588** and **CVE-2024-31492** [3], with a CVSS score of 7.8, are due to an external control of file name or path vulnerability. It may allow a local attacker to execute arbitrary code or commands via writing a malicious configuration file in `/tmp` before starting the installation process. The vulnerability **CVE-2023-41677** [4], with a CVSS score of 7.5, is due to an insufficiently protected credential. It may allow an attacker to obtain the administrator cookie in rare and specific conditions, via tricking the administrator into visiting a malicious attacker-controlled website through the SSL-VPN. # Affected Products The following product versions are affected: **CVE-2023-45590**: - FortiClientLinux version 7.2.0; - FortiClientLinux version 7.0.6 through 7.0.10; - FortiClientLinux version 7.0.3 through 7.0.4. **CVE-2023-45588** and **CVE-2024-31492**: - FortiClientMac version 7.2.0 through 7.2.3; - FortiClientMac version 7.0.6 through 7.0.10. **CVE-2023-41677**: - FortiOS version 7.4.0 through 7.4.1; - FortiOS version 7.2.0 through 7.2.6; - FortiOS version 7.0.0 through 7.0.12; - FortiOS version 6.4.0 through 6.4.14; - FortiOS version 6.2.0 through 6.2.15; - FortiOS 6.0 all versions; - FortiProxy version 7.4.0 through 7.4.1; - FortiProxy version 7.2.0 through 7.2.7; - FortiProxy version 7.0.0 through 7.0.13; - FortiProxy 2.0 all versions; - FortiProxy 1.2 all versions; - FortiProxy 1.1 all versions; - FortiProxy 1.0 all versions. # Recommendations CERT-EU strongly recommends updating affected software to the latest versions by following the instructions given by the vendor [2,3,4]. # References [1] [2] [3] [4]