Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
overview
Fortinet released security updates for two critical vulnerabilities found in FortiNAC and FortiWeb products. The vulnerabilities could allow unauthenticated attackers to perform arbitrary code or command execution.
CVE-2022-39952 impacts FortiNAC and has a critical CVSS score of 9.8. FortiNAC is an access control solution for networks that allows organizations to achieve network visibility in real-time, implement and enforce security protocols, and identify and resolve security threats. Fortinet’s advisory states that the vulnerability, known as an external control of file name or path vulnerability [CWE-73], could allow an unauthorized attacker to perform arbitrary write operations on the system without authentication.
CVE-2022-39952 impacts the following products:
CVE-2022-42756 has a critical CVSS score of 9.3 and impacts FortiWeb – a web application firewall (WAF) solution designed to safeguard web applications and APIs against online threats, such as cross-site scripting (XSS), SQL injection, bot attacks, DDoS (distributed denial of service), and other malicious activities. Fortinet’s advisory states that multiple stack-based overflow vulnerabilities [CWE-121] were found in FortiWeb’s proxy daemon. The vulnerabilities could allow an unauthenticated remote attacker to achieve arbitrary code execution via specifically crafted HTTP requests.
CVE-2022-42756 impacts the following products:
There are no workarounds or mitigations for CVE-2022-39952 or CVE-2022-42756. It is highly recommended that you apply the available security updates to address the vulnerabilities.
At this time, there are no known IoCs associated with CVE-2022-39952 and CVE-2022-42756. Avertium’s threat hunters remain vigilant in locating IoCs for our customers. Should any be located, Avertium will disclose them as soon as possible. For more information on how Avertium can help protect your organization, please reach out to your Avertium Service Delivery Manager or Account Executive.
SUPPORTING DOCUMENTATION