The four vulnerabilities that were flagged by Positive Technologies’ security researcher Andrey Medov, presented several threats, including an SQL Injection and Buffer Overflow vulnerabilities.
Medov considers these two the “most dangerous” of the lot since they allowed attackers to remotely execute arbitrary SQL queries and intercept administrator accounts, adding that “their exploitation does not require authorization.”
- Here’s our list of the best software firewalls
- Take a look at these best malware removal software
- We've also put together a list of the best endpoint protection software
Update to mitigate
The SQL injection vulnerability empowered the attacker to remotely execute arbitrary SQL queries by sending a malicious SQL command hidden inside a valid authorization header.
Two of the threats were buffer overflow vulnerabilities, one of which could be exploited to execute arbitrary code, while the other could be used for a Denial of Service (DoS) attack to crash the https daemon on the firewall.
The fourth was a format string vulnerability that allowed attackers to read the contents of the memory on the firewall for sensitive data, and even execute unauthorized code or commands.
Positive Technologies shared the fixes for all the four vulnerabilities with Fortinet and the company advises all its users to upgrade to the latest release to mitigate the vulnerabilities.
- Protect your devices with these best antivirus software
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.