83r71n<p>Fortinet has revealed vulnerabilities in its FortiOS, FortiProxy, FortiClient Linux, and FortiClient Mac products, including a critical one that could allow remote code execution. This critical flaw, identified as CVE-2023-45590, has a high severity score and could enable an attacker to execute arbitrary code by tricking a user into visiting a malicious website. Other high-severity issues affect FortiOS and FortiProxy, where credentials are not adequately protected. A specific flaw (CVE-2023-41677) might allow an attacker to steal the administrator cookie under certain conditions. Additionally, FortiClientMac has vulnerabilities due to a lack of configuration file validation. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory warning about the potential for cyber threat actors to exploit these vulnerabilities.</p><p><a href="https://www.fortiguard.com/psirt/FG-IR-23-087" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fortiguard.com/psirt/FG-IR-23-</span><span class="invisible">087</span></a></p><p><a href="https://www.fortiguard.com/psirt/FG-IR-23-345" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fortiguard.com/psirt/FG-IR-23-</span><span class="invisible">345</span></a></p><p><a href="https://www.fortiguard.com/psirt/FG-IR-23-493" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fortiguard.com/psirt/FG-IR-23-</span><span class="invisible">493</span></a></p><p><a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/fortinet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fortinet</span></a> <a href="https://ioc.exchange/tags/fortios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fortios</span></a> <a href="https://ioc.exchange/tags/fortiproxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fortiproxy</span></a> <a href="https://ioc.exchange/tags/forticlient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forticlient</span></a> <a href="https://ioc.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://ioc.exchange/tags/mac" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mac</span></a> <a href="https://ioc.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://ioc.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a> <a href="https://ioc.exchange/tags/cisa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cisa</span></a></p>