Active Exploitation of Existing Fortinet Vulnerability - 20241220001¶
Overview¶
Kaspersky’s Global Emergency Response Team (GERT) uncovered active exploitation of a patched vulnerability in Fortinet FortiClient EMS. This SQL injection vulnerability, identified as CVE-2023-48788, affects FortiClient EMS versions 7.0.1 to 7.0.10 and 7.2.0 to 7.2.2. Despite patches being available, attackers continue to exploit unupdated systems, enabling unauthorized code execution and network compromise.
What is vulnerable?¶
Product(s) Affected | Version(s) | CVE | CVSS | Severity |
---|---|---|---|---|
FortiClientEMS | 7.2 <= 7.2.2 7.0 <= 7.0.10 |
CVE-2023-48788 | 9.8 | Critical |
What has been observed?¶
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
Recommendation¶
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours... (refer Patch Management):
- FortiGuard Labs: https://www.fortiguard.com/psirt/FG-IR-24-007