hessen.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
hessen.social ist die Mastodongemeinschaft für alle Hessen:innen und alle, die sich Hessen verbunden fühlen

Serverstatistik:

1,6 Tsd.
aktive Profile

#forticlient

1 Beitrag1 Beteiligte*r0 Beiträge heute
starfrosch :mastodon:<p>Kann mich jemand unterstützen bei der Installation von <a href="https://mastodon.social/tags/Fortigate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fortigate</span></a> <a href="https://mastodon.social/tags/FortiClient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FortiClient</span></a> <a href="https://mastodon.social/tags/SSLVPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSLVPN</span></a> unter <a href="https://mastodon.social/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ubuntu</span></a> 24 LTS. Der Client läuft, die Config ist auch klar, aber die einzige Meldung die ich beim connecten kriege ist "Login canceled".</p>
Christian Lins<p>It certainly doesn't make the best impression if the download of a VPN client fails due to a server error. <a href="https://norden.social/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> <a href="https://norden.social/tags/FortiClient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FortiClient</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a>-linked actor's <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/DeepData" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeepData</span></a> exploits <a href="https://infosec.exchange/tags/FortiClient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FortiClient</span></a> VPN zero-day<br><a href="https://securityaffairs.com/171173/security/china-linked-actors-malware-deepdata-exploits-forticlient-vpn-zero-day.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/171173/sec</span><span class="invisible">urity/china-linked-actors-malware-deepdata-exploits-forticlient-vpn-zero-day.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/Fortinet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fortinet</span></a></p>
Redhotcyber<p>La vulnerabilità di SQL Injection di Fortinet viene sfruttata da una pericolosa campagna malware</p><p><a href="https://mastodon.bida.im/tags/Forescout" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Forescout</span></a> ha scoperto una nuova campagna che sfrutta una <a href="https://mastodon.bida.im/tags/vulnerabilit%C3%A0" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilità</span></a> nei dispositivi <a href="https://mastodon.bida.im/tags/Fortinet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fortinet</span></a> <a href="https://mastodon.bida.im/tags/FortiClient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FortiClient</span></a> <a href="https://mastodon.bida.im/tags/EMS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EMS</span></a> per diffondere <a href="https://mastodon.bida.im/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a>.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/online" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>online</span></a> <a href="https://mastodon.bida.im/tags/it" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>it</span></a> <a href="https://mastodon.bida.im/tags/web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>web</span></a> <a href="https://mastodon.bida.im/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/intelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligence</span></a> <a href="https://mastodon.bida.im/tags/intelligenzaartificiale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligenzaartificiale</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/la-vulnerabilita-di-sql-injection-di-fortinet-viene-sfruttata-da-una-pericolosa-campagna-malware/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/la-vulner</span><span class="invisible">abilita-di-sql-injection-di-fortinet-viene-sfruttata-da-una-pericolosa-campagna-malware/</span></a></p>
83r71n<p>Fortinet has revealed vulnerabilities in its FortiOS, FortiProxy, FortiClient Linux, and FortiClient Mac products, including a critical one that could allow remote code execution. This critical flaw, identified as CVE-2023-45590, has a high severity score and could enable an attacker to execute arbitrary code by tricking a user into visiting a malicious website. Other high-severity issues affect FortiOS and FortiProxy, where credentials are not adequately protected. A specific flaw (CVE-2023-41677) might allow an attacker to steal the administrator cookie under certain conditions. Additionally, FortiClientMac has vulnerabilities due to a lack of configuration file validation. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory warning about the potential for cyber threat actors to exploit these vulnerabilities.</p><p><a href="https://www.fortiguard.com/psirt/FG-IR-23-087" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fortiguard.com/psirt/FG-IR-23-</span><span class="invisible">087</span></a></p><p><a href="https://www.fortiguard.com/psirt/FG-IR-23-345" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fortiguard.com/psirt/FG-IR-23-</span><span class="invisible">345</span></a></p><p><a href="https://www.fortiguard.com/psirt/FG-IR-23-493" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fortiguard.com/psirt/FG-IR-23-</span><span class="invisible">493</span></a></p><p><a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/fortinet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fortinet</span></a> <a href="https://ioc.exchange/tags/fortios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fortios</span></a> <a href="https://ioc.exchange/tags/fortiproxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fortiproxy</span></a> <a href="https://ioc.exchange/tags/forticlient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forticlient</span></a> <a href="https://ioc.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://ioc.exchange/tags/mac" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mac</span></a> <a href="https://ioc.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://ioc.exchange/tags/cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cve</span></a> <a href="https://ioc.exchange/tags/cisa" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cisa</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> adds <a href="https://infosec.exchange/tags/FortiClient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FortiClient</span></a> EMS, <a href="https://infosec.exchange/tags/Ivanti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ivanti</span></a> EPM CSA, Nice Linear eMerge E3-Series bugs to its Known Exploited Vulnerabilities catalog<br><a href="https://securityaffairs.com/161057/security/cisa-adds-forticlient-ems-ivanti-epm-csa-nice-linear-emerge-e3-series-bugs-to-its-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/161057/sec</span><span class="invisible">urity/cisa-adds-forticlient-ems-ivanti-epm-csa-nice-linear-emerge-e3-series-bugs-to-its-known-exploited-vulnerabilities-catalog.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
83r71n<p>A critical vulnerability in Fortinet's FortiClient Enterprise Management Server (FortiClient EMS) was recently discovered and patched. This vulnerability, identified as CVE-2023-48788, was reported by the UK National Cyber Security Centre (NCSC) and was exploited in the wild at the time of the patch. The vulnerability, which could be exploited through SQL injection, was due to improper sanitization of elements in an SQL command. Security researchers have released a proof-of-concept (PoC) exploit for this flaw, which could potentially be used by attackers to execute unauthorized code or commands on the FortiClient EMS. Users are advised to upgrade to the latest versions of the software to mitigate this risk.</p><p><a href="https://www.horizon3.ai/attack-research/attack-blogs/cve-2023-48788-fortinet-forticlientems-sql-injection-deep-dive/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">horizon3.ai/attack-research/at</span><span class="invisible">tack-blogs/cve-2023-48788-fortinet-forticlientems-sql-injection-deep-dive/</span></a></p><p><a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/fortinet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fortinet</span></a> <a href="https://ioc.exchange/tags/forticlient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forticlient</span></a> <a href="https://ioc.exchange/tags/ems" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ems</span></a> <a href="https://ioc.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://ioc.exchange/tags/ncsc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ncsc</span></a> <a href="https://ioc.exchange/tags/sql" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sql</span></a> <a href="https://ioc.exchange/tags/injection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>injection</span></a> <a href="https://ioc.exchange/tags/poc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>poc</span></a> <a href="https://ioc.exchange/tags/horizon3ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>horizon3ai</span></a></p>
securityaffairs<p>Critical <a href="https://infosec.exchange/tags/Fortinet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fortinet</span></a>'s <a href="https://infosec.exchange/tags/FortiClient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FortiClient</span></a> EMS flaw actively exploited in the wild<br><a href="https://securityaffairs.com/160885/uncategorized/fortinet-forticlient-ems-critical-flaw.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/160885/unc</span><span class="invisible">ategorized/fortinet-forticlient-ems-critical-flaw.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
menschenfreund<p><a href="https://hessen.social/tags/FortiNet" class="mention hashtag" rel="tag">#<span>FortiNet</span></a> <a href="https://hessen.social/tags/FortiClient" class="mention hashtag" rel="tag">#<span>FortiClient</span></a> VPN Installer for Windows takes roughly ten minutes to &quot;Download Firmware Image&quot; via HTTP (no SSL). This is really inspiring confidence...</p>