![]() “Fortinet devices frequently sit at the edge of organizations’ networks, which makes them high-value targets,” Condon said via email. The ability to perform such actions is pretty much a worst case scenario for security teams who rely on the affected devices - including firewalls, web proxies and switch management platforms - to keep attackers out, according to Caitlin Condon, senior manager, software engineering (security research) at Rapid7. ![]() ![]() The authentication bypass vulnerability could allow an attacker to perform operations on the administrative interface using specially crafted HTTP or HTTPs requests, according to Fortinet.
0 Comments
Leave a Reply. |