Security Vendor Patches Vulnerabilities

Wednesday, August 10, 2016 @ 02:08 PM gHale


Patching can be difficult in the manufacturing automation environment, but when it comes to patching security product vulnerabilities, that raises the bar that much higher.

Such is the case with security solutions provider Fortinet. While the solutions may be on the enterprise side, the plant floor should be aware.

RELATED STORIES
Fixing an Internet Security Threat
Hunting Electric Grid Vulnerabilities
Side Channel Monitoring for Malware
IMPACT on Cyber Security

The vulnerabilities, most of which were stored and reflected cross-site scripting (XSS) issues, ended up reported by Vulnerability Lab in January, February and May and the vendor has since patched them.

A majority of the flaws were in the web interface of the Fortinet FortiManager and FortiAnalyzer security management and reporting appliances.

The weaknesses can end up exploited by a remote attacker with access to a low-privileged user account to inject arbitrary code into the application, said researchers at Vulnerability Lab. Exploitation requires the victim to click on a link or visit a certain page containing the malicious code.

A filter bypass and multiple persistent XSS vulnerabilities were also in Fortinet’s FortiVoice enterprise phone systems. A remote authenticated attacker could exploit the issues flaws.

Researchers also disclosed multiple persistent XSS issues in the FortiCloud cloud-based wireless security and management system.

An attacker who has access to the product’s Summary Report page can inject malicious code, which gets executed when a legitimate user visits the page.

Fortinet published its own advisory for one of the flaws (CVE-2016-3196).

If possible, users should update their Fortinet product installations. In addition, researchers published details and proof-of-concept (PoC) code for each of the vulnerabilities they have found.