Skip to content

Active Exploitation of Existing Fortinet Vulnerability - 20241220001

Overview

Kaspersky’s Global Emergency Response Team (GERT) uncovered active exploitation of a patched vulnerability in Fortinet FortiClient EMS. This SQL injection vulnerability, identified as CVE-2023-48788, affects FortiClient EMS versions 7.0.1 to 7.0.10 and 7.2.0 to 7.2.2. Despite patches being available, attackers continue to exploit unupdated systems, enabling unauthorized code execution and network compromise.

What is vulnerable?

Product(s) Affected Version(s) CVE CVSS Severity
FortiClientEMS 7.2 <= 7.2.2
7.0 <= 7.0.10
CVE-2023-48788 9.8 Critical

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours... (refer Patch Management):

Additional References