Fortinet Flaw Frenzy: Patch Now or Risk Admin Access Hijinks!
Fortinet warns about a critical flaw in FortiWLM that could allow admin access and sensitive data leaks. The vulnerability was patched, but attackers might still use it to read log files or even hijack sessions. Update your systems, unless you want your wireless LAN to get more traffic than a Black Friday sale!

Hot Take:
Looks like Fortinet’s Wireless LAN Manager had a “come as you are” party for hackers, but luckily the bouncer, CVE-2023-34990, has been kicked out. Grab your patches, folks, before your sensitive data gets treated like an open bar!
Key Points:
- Fortinet discovered a critical vulnerability, CVE-2023-34990, in its Wireless LAN Manager (FortiWLM).
- The vulnerability allows remote attackers to gain admin access and read sensitive files via a path traversal flaw.
- FortiWLM versions affected include 8.6.0 to 8.6.5 and 8.5.0 to 8.5.4, with fixes in versions 8.6.6 and 8.5.5, respectively.
- The flaw exposes static session IDs, which attackers could exploit to hijack user sessions.
- Fortinet urges users, particularly in SLED and healthcare sectors, to apply patches promptly.
Already a member? Log in here