<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[PoC Exploits for Critical FortiSIEM Command Execution Flaws Released (CVE-2024-23108, CVE-2023-34992)]]></title><description><![CDATA[<p dir="auto">FortiSIEM helps customers build an inventory of their organization’s assets, it aggregates logs and correlates information for threat detection and hunting, and allows automated response and remediation. CVE-2024-23108 and CVE-2024-23109 are OS command injection vulnerabilities in the FortiSIEM supervisor and can be exploited remotely, without authentication, with specially crafted API requests. Both flagged by Zach Hanley of <a href="http://Horizon3.ai" target="_blank" rel="noopener noreferrer nofollow ugc">Horizon3.ai</a>, they are variants/patch bypasses of CVE-2023-34992, which Fortinet fixed in October 2023. The two variants were fixed in January 2024, and admins were advised to upgrade. (Fortinet created some confusion regarding CVE-2024-23108 and CVE-2024-23109 because it initially stated that the two CVEs were assigned erroneously, then later said that they were variants of CVE-2023-34992. An email Hanley received from Fortinet PSIRT confirmed the assigned CVEs.) PoCs for CVE-2024-23108 and CVE-2023-34992 have been published by Hanley on GitHub. Hanley has noted that “there is very little difference in the exploitation of the previous command injection, CVE-2023-34992, to this one, CVE-2024-23108, reported 6 months later”, and said that attempts to exploit them will leave evidence in the logs for the phMonitor service. For example, attempts to exploit CVE-2024-23108 will leave a log message containing a failed command with datastore[.]py nfs test. Admins should check their FortiSIEM installations and (if they haven’t already) upgrade to a version containing the fix. Vulnerabilities in Fortinet solutions are often leveraged by attackers in the wild, but there is no mention yet of these ones being exploited.</p>
<p dir="auto"><strong>ที่มาแหล่งข่าว</strong><br />
<a href="https://www.helpnetsecurity.com/2024/05/29/cve-2024-23108-cve-2023-34992-poc/" target="_blank" rel="noopener noreferrer nofollow ugc">https://www.helpnetsecurity.com/2024/05/29/cve-2024-23108-cve-2023-34992-poc/</a></p>
<p dir="auto"><img src="/assets/uploads/files/1717032263343-48a41c1a-e531-4515-a9e1-425763e73132-image.png" alt="48a41c1a-e531-4515-a9e1-425763e73132-image.png" class=" img-fluid img-markdown" /></p>
]]></description><link>https://webboard-nsoc.ncsa.or.th/topic/717/poc-exploits-for-critical-fortisiem-command-execution-flaws-released-cve-2024-23108-cve-2023-34992</link><generator>RSS for Node</generator><lastBuildDate>Sat, 14 Mar 2026 22:49:18 GMT</lastBuildDate><atom:link href="https://webboard-nsoc.ncsa.or.th/topic/717.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 30 May 2024 01:24:28 GMT</pubDate><ttl>60</ttl></channel></rss>