The four vulnerabilities that were flagged by Positive Technologies’ security researcher Andrey Medov, presented several threats, including an SQL Injection and Buffer Overflow vulnerabilities.
Medov considers these two the “most dangerous” of the lot since they allowed attackers to remotely execute arbitrary SQL queries and intercept administrator accounts, adding that “their exploitation does not require authorization.”
- Here’s our list of the best software firewalls (opens in new tab)
- Take a look at these best malware removal software (opens in new tab)
- We've also put together a list of the best endpoint protection software (opens in new tab)
Update to mitigate
The SQL injection vulnerability empowered the attacker to remotely execute arbitrary SQL queries by sending a malicious SQL command hidden inside a valid authorization header.
Two of the threats were buffer overflow vulnerabilities, one of which could be exploited to execute arbitrary code, while the other could be used for a Denial of Service (DoS) attack to crash the https daemon on the firewall.
The fourth was a format string vulnerability that allowed attackers to read the contents of the memory on the firewall for sensitive data, and even execute unauthorized code or commands.
Positive Technologies shared the fixes for all the four vulnerabilities with Fortinet and the company advises all its users to upgrade to the latest release to mitigate the vulnerabilities.
- Protect your devices with these best antivirus software (opens in new tab)