CVE-2024-23663 & CVE-2024-27784: High-Severity Flaws in Fortinet FortiExtender and FortiAIOps
Fortinet, a global leader in cybersecurity solutions, has issued a security advisory detailing two high-severity vulnerabilities impacting their FortiExtender and FortiAIOps products. These vulnerabilities, if exploited, could lead to unauthorized access and data exposure, putting critical network infrastructure at risk.
FortiExtender’s Privilege Escalation Threat:
The first vulnerability, CVE-2024-23663, affects FortiExtender, a popular 3G/4G LTE and 5G wireless WAN extender. This flaw, rated with a CVSS score of 8.8, could allow an attacker to create users with elevated privileges through a crafted HTTP request, potentially gaining control over the device. This could result in unauthorized configuration changes, disruption of network services, or even complete compromise of the system.
FortiAIOps’ Data Leakage Risk:
The second vulnerability, CVE-2024-27784, also rated 8.8 on the CVSS scale, resides in the API endpoint of FortiAIOps, Fortinet’s AI/ML-powered network monitoring solution. This flaw could enable an attacker to retrieve sensitive information from the API or logs, potentially exposing confidential data and compromising network security.
Urgent Action Required:
Fortinet strongly recommends that all customers using vulnerable versions of FortiExtender and FortiAIOps upgrade to the latest patched versions immediately. The company has released updates for both products that address these critical vulnerabilities. While there is no information indicating active exploitation of these vulnerabilities, proactive measures are crucial to maintain system security.