More than 330,000 FortiGate firewall appliances are still vulnerable to a remote code execution (RCE) attack three weeks after the vendor Fortinet issued a critical fix for the flaw on June 12.In a Friday post, BishopFox researchers reported that the network scanning tool Shodan found that 69% of the 490,000 SSL-VPN interfaces accessible via the public internet were unpatched and vulnerable to attack.The flaw CVE-2023-27997, found by researchers Charles Fol and Dany Bach at security firm Lexfo, is a heap overflow class bug impacting the company's FortiOS and FortiProxy Secure Sockets Layer Virtual Private Network (SSL VPN). A SSL VPN is defined by F5 Networks as a "virtual private network created using the Secure Sockets Layer protocol to create a secure and encrypted connection over a less-secure network, such as the internet."A remote attacker can exploit the flaw via a crafted request. NIST rates the critical flaw with CVSS severity score of 9.8 out of 10. Fortinet has been working to address the firewall issue for several weeks. On June 12, SC Media reported that Fortinet released patches for the FortiOS firmware for the following versions: 7.0.12, 7.2.5, 6.4.13 and 6.2.15. On June 11, Lexfo security researcher Fol published a tweet disclosing the flaw, promising that Fortinet would soon publish a patch for CVE-2023-27997.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds