In this week's Security Advisory:
New threat intel indicates that the vulnerability (CVE-2024-23108) impacting FortiSIEM has a released proof-of-concept (PoC) exploit on the public web. It is recommended to update FortiClient FortiSIEM to the latest version immediately.
Original Security Advisory - February 14, 2024:
Fortinet announced two critical vulnerabilities in its FortiSIEM report server. Identified as 2024-23108 and CVE-2024-23109, remote unauthenticated attackers are able to exploit the FortiSIEM systems by sending well-crafted API requests to an affected system. Fortinet has clarified that CVE-2024-23108 and CVE-2024-23109 are patch bypasses to a previously observed issue in CVE-2023-34992.
Affected Versions:
The following versions are affected:
More Reading/Information
A vulnerability identified within Apache Flink in 2021 is currently being actively exploited in the wild. Tracked as CVE-2020-17519, the flaw carries a CVSS score of 7.5 out of 10 due to inadequate access controls. This flaw enables remote attackers to gain unauthorized access, allowing them to read sensitive files on the local system through the JobManager process.
Organizations should update their Apache Flink installations to the latest patch or ensure they're running at least Version 1.11.3 or 1.12.0.
Affected Versions
More Reading/Information
Check Point has released an urgent hotfix for a zero-day VPN vulnerability tracked as CVE-2024-24919 affecting its Security Gateways. The flaw can allow an attacker to read system information on Security Gateways that are exposed to the internet. Successful exploitation can allow threat actors to gain remote access to client firewalls.
Of note, CVE-2024-24919 only affects Security Gateways with 'Remote Access VPN' or 'Mobile Access Blade' enabled.
Affected Products & Versions:
More Reading/Information
Google Chrome has issued a security update addressing one (1) vulnerability that impacts Windows, Mac, and Linux operating systems.
The vulnerability is currently being tracked as CVE-2024-5274 with a "High" severity rating and is currently being exploited in the wild.
More Reading/Information
Please review your environment to ensure the above-mentioned issues are patched in a timely manner. It is security best practice to regularly update and/or patch software to the latest versions. The vulnerabilities above highlight the security benefits of limiting deployed software to "vendor-supported versions" only. This dramatically increases the likelihood that new vulnerabilities have a patch issued for them. Likewise, Cybersafe strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.