By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
softwareprosoftwarepro
  • Home
  • A/B Testing Tools
    • Accounting Software
    • Ad Serving & Retargeting Platforms
    • All-in-One Marketing Platforms
    • Applicant Tracking Systems (ATS)
    • Business Intelligence (BI) Tools
    • Cloud Storage Systems
    • Collaboration Tools
    • Content Management(CMS)
    • Corporate Learning Management
  • Agile
    • AI
    • Big Data
    • Cloud
    • Database
    • Devops
    • Integration
    • IoT
    • Java
    • Guest Posting
  • Customer Relationship (CRM)
    • Email Marketing Software
    • Fraud Detection Software
    • Help Desk Software
    • HR Management Software
    • Integration Platform as a Software
    • Marketing Automation Software
    • Network Performance Monitoring
    • Payroll Software
  • Project Management Software
    • SEO Software
    • Social Media Management Tools
    • Talent Intelligence Tools Solutions
    • Talent Management
    • Web Analytics Tools
    • Web and Video Conferencing
    • Workforce Analytics Software
    • Workforce Management Software
  • Accessibility Testing Tools
    • Agile Development Software
    • Augmented Development Platforms
    • Automation Testing Tools
    • Batch Management Software
    • Beta Testing Software
    • Bug Tracking Software
  • More
    • Microservices
    • Open Source
    • Performance
    • Security
    • Web Dev
    • Automotive
    • Business
    • Consumer & Gadgets
    • Electronics & Semiconductors
    • Energy & Green Tech
    • Engineering
    • Hardware
    • Hi Tech & Innovation
    • Internet
    • Machine learning & AI
Search
  • Consumer & Gadgets
  • Electronics & Semiconductors
  • Energy & Green Tech
  • Engineering
  • Hardware
  • Hi Tech & Innovation
  • Internet
  • Machine learning & AI
© 2022 Softwareproz.com/knowledge resources for software developers. All Rights Reserved.
Reading: Fortinet flaws are being exploited in attacks on government
Share
Notification Show More
Latest News
Solving the Kubernetes Security Puzzle
Agile AI Big Data Cloud Database Devops Integration IoT Java Microservices Open Source Performance Security Web Dev
Solving the Kubernetes Security Puzzle
Agile AI Big Data Cloud Database Devops Integration IoT Java Microservices Open Source Performance Security Web Dev
Solving the Kubernetes Security Puzzle
Agile AI Big Data Cloud Database Devops Integration IoT Java Microservices Open Source Performance Security Web Dev
Solving the Kubernetes Security Puzzle
Agile AI Big Data Cloud Database Devops Integration IoT Java Microservices Open Source Performance Security Web Dev
Solving the Kubernetes Security Puzzle
Agile AI Big Data Cloud Database Devops Integration IoT Java Microservices Open Source Performance Security Web Dev
Aa
softwareprosoftwarepro
Aa
Search
  • Home
  • A/B Testing Tools
    • Accounting Software
    • Ad Serving & Retargeting Platforms
    • All-in-One Marketing Platforms
    • Applicant Tracking Systems (ATS)
    • Business Intelligence (BI) Tools
    • Cloud Storage Systems
    • Collaboration Tools
    • Content Management(CMS)
    • Corporate Learning Management
  • Agile
    • AI
    • Big Data
    • Cloud
    • Database
    • Devops
    • Integration
    • IoT
    • Java
    • Guest Posting
  • Customer Relationship (CRM)
    • Email Marketing Software
    • Fraud Detection Software
    • Help Desk Software
    • HR Management Software
    • Integration Platform as a Software
    • Marketing Automation Software
    • Network Performance Monitoring
    • Payroll Software
  • Project Management Software
    • SEO Software
    • Social Media Management Tools
    • Talent Intelligence Tools Solutions
    • Talent Management
    • Web Analytics Tools
    • Web and Video Conferencing
    • Workforce Analytics Software
    • Workforce Management Software
  • Accessibility Testing Tools
    • Agile Development Software
    • Augmented Development Platforms
    • Automation Testing Tools
    • Batch Management Software
    • Beta Testing Software
    • Bug Tracking Software
  • More
    • Microservices
    • Open Source
    • Performance
    • Security
    • Web Dev
    • Automotive
    • Business
    • Consumer & Gadgets
    • Electronics & Semiconductors
    • Energy & Green Tech
    • Engineering
    • Hardware
    • Hi Tech & Innovation
    • Internet
    • Machine learning & AI
Follow US
  • Consumer & Gadgets
  • Electronics & Semiconductors
  • Energy & Green Tech
  • Engineering
  • Hardware
  • Hi Tech & Innovation
  • Internet
  • Machine learning & AI
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
softwarepro > Blog > Audio > Fortinet flaws are being exploited in attacks on government
AudioDigital HomeGamingHome CinemaMobile Computing

Fortinet flaws are being exploited in attacks on government

Last updated: 2023/03/15 at 11:45 AM
Share
SHARE

Unknown hackers have recently targeted certain US government networks with a zero-day vulnerability found in a Fortinet product. 

While the targets or the extent of success are not currently known, there are details available pertaining to the zero-day used in the attack. We also know that it’s been patched in the meantime, with Fortinet urging customers to apply the fix immediately.

According to a BleepingComputer report on the attack, the threat actors abused CVE-2022-41328 – an improper limitation of a pathname to a restricted directory vulnerability (‘path traversal’) [CWE-22] in FortiOS, which could have allowed a privileged attacker “to read and write arbitrary files via crafted CLI commands,” Fortinet’s advisory reads. In other words, hackers could have executed unauthorized code or commands.

Single target

The list of affected products includes FortiOS versions 6.0, 6.2, as well as 6.4.0 through 6.4.11, FortiOS version 7.0.0 through 7.0.9, and FortiOS version 7.2.0 through 7.2.3. Secure versions include 6.4.12 and later, 7.0.10 and later, and 7.2.4 and later. 

Read more

> Fortinet warns VPN users targeted by critical vulnerability

> Nasty vulnerability in Fortinet firewalls, proxies abused in real-world attacks

> These are the best endpoint protection services today

A week before news of the patch broke, the company released a report in which it said the CVE was used to take down “multiple FortiGate firewall devices” belonging to one of its customers. 

According to the company’s analysis, the attacks were “highly targeted”, with the hackers specifically favoring government networks. These threat actors operate with “advanced capabilities”, the researchers said, including reverse-engineering parts of the FortiGate devices’ operating system.

Check out the best small business software around

Via: BleepingComputer

You Might Also Like

Is Duolingo building a new music-learning app? We interpret the signs

iOS 17: latest news, rumors, and everything we know so far

Google Bard beta live: how to sign up and what the ChatGPT rival can do

The Pro version of the Nvidia RTX 4090 Mobile may turn out to be a bit disappointing

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share this Article
Facebook Twitter Copy Link Print
Share
Previous Article Review: 2023 Toyota Prius vs. 2023 Kia Niro
Next Article South Korea to build ‘world’s largest’ chip center
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow
banner banner
Create an Amazing Newspaper
Discover thousands of options, easy to customize layouts, one-click to import demo and much more.
Learn More

Latest News

Solving the Kubernetes Security Puzzle
Agile AI Big Data Cloud Database Devops Integration IoT Java Microservices Open Source Performance Security Web Dev
Solving the Kubernetes Security Puzzle
Agile AI Big Data Cloud Database Devops Integration IoT Java Microservices Open Source Performance Security Web Dev
Solving the Kubernetes Security Puzzle
Agile AI Big Data Cloud Database Devops Integration IoT Java Microservices Open Source Performance Security Web Dev
Solving the Kubernetes Security Puzzle
Agile AI Big Data Cloud Database Devops Integration IoT Java Microservices Open Source Performance Security Web Dev
//

We influence 20 million users and is the number one business and technology news network on the planet

Quick Link

  • Audio
  • Digital Home
  • Emerging Technology
  • Enterprise Application
  • Gaming
  • Mobile and Wireless
  • Networking
  • Operating System
  • Photography Video Capture

Blog Categories

  • Environment
  • Health
  • science
  • Technology
  • Amazon
  • Analyst Insights
  • Android
  • Apple
  • Ecommerce

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!
softwareprosoftwarepro
Follow US

© 2022 Software Pro News Network. Software Pro Design Company. All Rights Reserved.

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Register Lost your password?