A security weakness affecting FortiGate firewalls and FortiProxy web proxies. These proxies can allow an attacker to carry out unauthorized actions on vulnerable systems(Auth Bypass Flaw). It has been confidentially disclosed by Fortinet to its customers.

The high-severity bug, identified as CVE-2022-40684, relates to an authentication bypass vulnerability. This auth bypass flaw might allow an unauthenticated attacker to carry out arbitrary activities on the administrator interface.

This week’s releases of FortiProxy version 7.0.7 and FortiOS versions 7.0.7 and 7.2.2 address the problem that affects these versions:

  • FortiOS – From 7.0.0 to 7.0.6 and from 7.2.0 to 7.2.1
  • FortiProxy – From 7.0.0 to 7.0.6 and 7.2.0

In a warning posted on Twitter by a security expert going by the handle Gitworm, Fortinet stated. The statement says “highly recommends all customers with the vulnerable versions to execute an immediate upgrade due to the ability to exploit this problem remotely”.

When contacted for a response, Fortinet recognized the advice and said it would hold off on releasing the information to the public until all of its clients had implemented the updates.

The company said in a statement provided to The Hacker News that “timely and ongoing interactions with our clients. The client has a vital component in our efforts to better safeguard and secure their organization.” Customer communications frequently include the most recent advice and suggested next measures for the greatest protection and security of their organization.

“In some cases, confidential advance customer communications may contain early warnings on advisories to help customers further reinforce their security posture. These communications will then be made available to the public and a wider audience in the following days. Our top goal is always our consumers’ security.”