
Fortinet has released security updates across multiple products, including patches, for a critical vulnerability in FortiPresence.
FortiPresence is a data analytics solution available as a hosted cloud service or as a virtual machine for private installations. A critical missing authentication vulnerability tracked as CVE-2022-41331 with a CVSS score of 9.3 in the FortiPresence infrastructure server may be exploited to access Redis and MongoDB instances through crafted authentication requests.
The impacted FortiPresence versions are 1.0, 1.1, and 1.2, and they were addressed with the release of version 2.0.0.
Fortinet also announced patches for multiple high-severity flaws in FortiOS, FortiProxy, FortiSandbox, FortiDeceptor, FortiWeb, FortiClient for Windows and macOS, FortiSOAR, FortiADC, FortiDDoS, FortiDDoS-F, FortiAnalyzer, and FortiManager.
The addressed issues could lead to XSS attacks, unauthorized API calls, command execution, arbitrary code execution, arbitrary file creation, privilege escalation, information disclosure, arbitrary file retrieval, and man-in-the-middle attacks.
Another Fortinet advisory detailing a vulnerability in the Linux kernel version used in FortiAuthenticator, FortiProxy, and FortiSIEM, which could allow an attacker with low privileges to write to page cache and escalate privileges on the system. Tracked as CVE-2022-0847 and also referred to as Dirty Pipe, the flaw was introduced in Linux kernel version 5.8 and was addressed last year in Linux 5.16.11, 5.15.25 and 5.10.102.
Several medium and low severity vulnerabilities impacting FortiNAC, FortiOS, FortiProxy, FortiADC, FortiGate, and FortiAuthenticator were also addressed.
Customers are advised to update their installations as soon as possible. Fortinet is not aware of any vulnerabilities being exploited in attacks, unpatched Fortinet products are known to have been targeted in malicious attacks, including by nation-state threat actors.