Remove 2019 Remove Authentication Remove Blog Remove Operating System
article thumbnail

CVE-2018-13379, CVE-2019-5591, CVE-2020-12812: Fortinet Vulnerabilities Targeted by APT Actors

Tenable

CVE-2019-5591. Improper Authentication (FortiOS). This blog post was published on April 8 and reflects VPR at that time. All three vulnerabilities reside within Fortinet’s FortiOS, the operating system that underpins Fortinet’s devices. CVE-2018-13379. Path Traversal/Arbitrary File Read (FortiOS). CVE-2020-12812.

article thumbnail

CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability

Tenable

critical infrastructure through exploitation of known vulnerabilities Background On February 8, Fortinet published an advisory (FG-IR-24-015) to address a critical flaw in FortiOS, its network operating system. CVE Description CVSSv3 Severity CVE-2024-21762 Fortinet FortiOS Out-of-bound Write Vulnerability in sslvpnd 9.6

Malware 121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CVE-2024-3400: Zero-Day Vulnerability in Palo Alto Networks PAN-OS GlobalProtect Gateway Exploited in the Wild

Tenable

Background On April 12, Palo Alto Networks released a security advisory for a critical command injection vulnerability affecting PAN-OS, the custom operating system (OS) Palo Alto Networks (PAN) uses in their next-generation firewalls. Solution As of April 12, Palo Alto Networks has not provided patches for this vulnerability.

Network 118
article thumbnail

CVE-2021-22893: Zero-Day Vulnerability in Pulse Connect Secure Exploited in the Wild

Tenable

In addition to the advisory, Pulse Secure also published a blog post detailing observed exploit behavior related to the zero-day as well others linked to previously disclosed vulnerabilities in its Pulse Connect Secure solution. Pulse Connect Secure Authentication Bypass Vulnerability. CVE-2019-11510. Authenticated.

article thumbnail

CVE-2022-37958: FAQ for Critical Microsoft SPNEGO NEGOEX Vulnerability

Tenable

CVE-2022-37958 is a remote code execution (RCE) vulnerability in the SPNEGO NEGOEX protocol of Windows operating systems, which supports authentication in applications. There are no reports of confirmed in-the-wild exploitation for CVE-2022-37958 at the time this blog post was released. What is SPNEGO NEGOEX?

Windows 98
article thumbnail

Microsoft’s October 2023 Patch Tuesday Addresses 103 CVEs (CVE-2023-36563, CVE-2023-41763)

Tenable

This vulnerability was exploited in the wild according to Microsoft, though no details have been shared at the time this blog post was published. Researcher Florian Hauser of Code White GmbH published a two-part blog series in September 2022 investigating Skype for Business 2019. and rated critical. and is rated as important.

Windows 114
article thumbnail

CVE-2021-21972: VMware vCenter Server Remote Code Execution Vulnerability

Tenable

These include CVE-2019-19781 , a critical vulnerability in Citrix Application Delivery Controller (ADC) and Gateway , and CVE-2020-5902 , a critical vulnerability in F5 BIG-IP. The issue stems from a lack of authentication in the vRealize Operations vCenter Plugin. Positive Technologies Blog Post for CVE-2021-21972.

Linux 103