On January 14, 2025, Fortinet announced several vulnerabilities impacting multiple products. At Systems Engineering, we are highlighting these vulnerabilities as they affect the Fortinet solutions we support. Specifically, these issues impact FortiGate, FortiSwitch, FortiManager, FortiAnalyzer, FortiClient EMS, and FortiClient for Windows.
SCOPE
These vulnerabilities affect multiple aspects of these products including Management Interfaces, VPNs, Cryptographic keys, device registration, and other aspects of these products. These vulnerabilities include but not limited to, unauthenticated remote code execution, creating malicious files, and denial-of-service attacks.
List of Fortinet Advisories
NAME |
SEVERITY |
Admin Account Persistence after Deletion | HIGH |
HIGH |
|
HIGH |
|
HIGH |
|
HIGH |
|
Command injection in csfd daemon |
HIGH |
EMS console login under brute force attack does not get locked |
HIGH |
Hardcoded Session Secret Leading to Unauthenticated Remote Code Execution |
CRITICAL |
Missing authentication for managed device configuration files |
HIGH |
HIGH |
|
HIGH |
|
HIGH |
|
HIGH |
|
Path traversal in csfd daemon |
HIGH |
Weak Authentication in csfd daemon |
HIGH |
COURSE OF ACTION
Fortinet has released security updates to remediate affected systems. Our team is proactively patching these vulnerabilities and will be in contact with you with details about scheduling remediation.
For all other clients, we recommend that you have your affected systems patched immediately. If you would like our assistance with patching, please contact Systems Engineering Customer Service at 207.772.4199 to open a ticket and have your system updated.
If you are a Systems Engineering client and have questions about this Security Alert, please contact your Account Manager.