Patch Panic: Fortinet’s Critical Vulnerability Fix – Don’t Let Hackers Crash Your Network Party!

Fortinet patches a critical vulnerability in FortiWLM that allows for remote code execution. The flaw, tracked as CVE-2023-34990, could let attackers read sensitive files without authentication. The vulnerability impacts certain FortiWLM versions and is now fixed in the latest updates.

Pro Dashboard

Hot Take:

Looks like Fortinet’s Wireless Manager has more bugs than a summer picnic, but don’t worry—they’ve got the bug spray! Just make sure you’re not still using last year’s picnic blanket, er, software version.

Key Points:

  • Fortinet announced patches for a critical vulnerability in FortiWLM, a wireless device management tool.
  • The flaw, CVE-2023-34990, is a “relative path traversal” issue that can be exploited without authentication.
  • Affected versions include FortiWLM 8.6.0-8.6.5 and 8.5.0-8.5.4, but the issue is resolved in versions 8.6.6 and 8.5.5.
  • Security researcher Zach Hanley reported the vulnerability and other issues last year.
  • Fortinet has also patched a high-severity OS command injection bug in FortiManager, tracked as CVE-2024-48889.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?