- Fortinet has found an escalation of the privilege flaw in several versions of Fortiswitch
- The flaw received a critical gravity score
- A patch and an attenuation measure are both available
Fortinet has corrected a vulnerability of critical gravity in Fortiswitch, which allowed malware to modify user connection information.
In a short -term security opinion published earlier this week, the company detailed the climbing of Privilege Flaw, the Fortiswitch versions that have been affected and have suggested a bypass solution for those who cannot repair things immediately.
The bug is followed as Swe-620 and received a gravity score of 9.3 / 10 (critic). According to NVD, it is followed as CVE-2024-48887 and has a still worse severity score-9.8 / 10. Apparently, the bug was found in the password reset form, which can also be forced to provide the original password.
Work around bug
“Do not use the” Forgotten password “feature, said the Corporation in its opinion. “But if you must, make sure you only provide information to the real user, for example using an e-mail address or a challenge question that the legitimate user already provided in the past; do not allow the current user to modify this identity information until the correct password has not been provided.”
The affected versions include Fortiswitch 6.4 to 6.4.14, 7.0 to 7.0.10, 7.2 to 7.2.8, 7.4 to 7.4.4 and 7.6. Users must switch to the latest version of the tool to mitigate the flaw.
Those who cannot apply the fixes are immediately invited to deploy the bypass solution and deactivate HTTP / HTTPS access from administrative interfaces.
Fortinet Fortiswitch is a family of secure and high performance Ethernet switches designed to integrate closely with Fortinet safety fabric, in particular Fortigate firewalls. It is mainly used in commercial environments, making it a highly sought -after target. Firewalls, switches and centers are an excellent springboard throughout the target network and towards larger and daring targets.
Via The Hacker News