Remove 2018 Remove Authentication Remove Blog Remove Operating System
article thumbnail

CVE-2018-13379, CVE-2019-5591, CVE-2020-12812: Fortinet Vulnerabilities Targeted by APT Actors

Tenable

CVE-2018-13379. Improper Authentication (FortiOS). This blog post was published on April 8 and reflects VPR at that time. This blog post was published on April 8 and reflects VPR at that time. All three vulnerabilities reside within Fortinet’s FortiOS, the operating system that underpins Fortinet’s devices.

article thumbnail

CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability

Tenable

critical infrastructure through exploitation of known vulnerabilities Background On February 8, Fortinet published an advisory (FG-IR-24-015) to address a critical flaw in FortiOS, its network operating system. CVE Description CVSSv3 Severity CVE-2024-21762 Fortinet FortiOS Out-of-bound Write Vulnerability in sslvpnd 9.6

Malware 121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft’s November 2020 Patch Tuesday Addresses 112 CVEs including CVE-2020-17087

Tenable

NFS is a file system protocol used for file sharing across multiple operating systems on a network. According to the limited information provided by Microsoft, the vulnerability appears to impact all supported versions of Windows and can be exploited without authentication or user interaction based on the CVSSv3 score of 9.8.

Windows 105
article thumbnail

Is Leadership Development the Answer to Low Employee Engagement? (Yes.)

N2Growth Blog

A growing problem (or opportunity) for learning and development professionals is the finding in HBR’s 2018 study that while 67% of boomers describe current L&D offerings as excellent, only 40% of millennials do. After all, some apps do not run on old antiquated operating systems. When we stop learning, we stop leading.

article thumbnail

Dealing with the Attack Surface Beyond Vulnerabilities

Tenable

This blog post explains what defines an attack surface and presents an example of how Tenable's data allows security professionals to have a more realistic view of their exposure. Brute force, leaked credentials, or a weakness that could allow authentication bypass, information leakage, or code execution. What is an Attack Surface?

article thumbnail

CVE-2020-2021: Palo Alto Networks PAN-OS Vulnerable to Critical Authentication Bypass Vulnerability

Tenable

Critical authentication bypass vulnerability in PAN-OS devices could be exploited in certain configurations, which are commonly recommended by identity providers. PAN-OS is the custom operating system (OS) that Palo Alto Networks (PAN) uses in their next-generation firewalls. Authentication and Captive Portal. Background.

article thumbnail

Top Ten Ways Not To Sink the Kubernetes Ship

Linux Academy

Vulnerabilities at the operating system level may be exploited by rogue container workloads if not hardened. Recent vulnerabilities in the runc container engine, and the CVE-2018-1002105 tCP vulnerability in TCP (Transport Control Protocol) itself requires quick upgrades of the cluster modules themselves. Implement RBAC.