Fortinet has addressed a critical vulnerability, identified as CVE-2023-48788, in its FortiClient Endpoint Management Server (EMS) software. The flaw, a severe SQL Injection vulnerability, allows unauthenticated attackers to execute code remotely with SYSTEM privileges on the server. The cybersecurity community, including Horizon3Attack, Security Affairs, The Hacker News, and Infosecurity Magazine, has highlighted the urgency of the situation, advising users to check their systems for indicators of compromise (IOCs) and to update their software as soon as possible to mitigate the risk of Remote Code Execution (RCE) as SYSTEM.
Fortinet Patches Critical Bug in FortiClient EMS https://t.co/plM6S8VJQN
Fortinet Warns of Severe SQLi Vulnerability in FortiClientEMS Software: https://t.co/S2RHleGlQu by The Hacker News #infosec #cybersecurity #technology #news
β οΈ Vulnerability Alert: Fortinet warns of a severe SQL Injection #vulnerability (CVE-2023-48788) in FortiClientEMS allowing unauthenticated attackers to execute code remotely. Details: https://t.co/yHa0OB0Cs4 Check if your versions are affected and upgrade ASAP!
Fortinet fixes critical bugs in FortiOS, FortiProxy, and FortiClientEMS: https://t.co/No8C41APKg by Security Affairs #infosec #cybersecurity #technology #news
The recent #Fortinet #FortiClient Endpoint Management Server (EMS) SQL injection vulnerability, CVE-2023-48788, allows an unauth attacker to obtain RCE as SYSTEM on the server. IOCs, POC, and deep-dive blog to be released next week. In the meantime, check DAS service logs for⦠https://t.co/57ps2WiY8R