Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»New Vulnerabilities in Fortinet, SonicWall, and Grafana Pose Significant Risks

    New Vulnerabilities in Fortinet, SonicWall, and Grafana Pose Significant Risks

    November 4, 2024

    IT Vulnerabilities

    Cyble Research and Intelligence Labs (CRIL) has identified new IT vulnerabilities affecting Fortinet, SonicWall, Grafana Labs, and CyberPanel, among others. The report for the week of October 23-29 highlights seven IT vulnerabilities that require urgent attention from security teams, particularly given the sheer number of exposed devices involved.  

    The latest findings indicate that vulnerabilities in Fortinet, SonicWall, and Grafana Labs impact over 1 million web-facing assets. Notably, two high-severity vulnerabilities in CyberPanel have already been leveraged in widespread ransomware attacks. Organizations are urged to quickly assess their environments for these vulnerabilities and implement necessary patches and mitigations.  

    Major IT Vulnerabilities of the Week  

    Here are the top vulnerabilities detailed by Cyble’s researchers, emphasizing the potential impact on IT security:  

    CVE-2024-40766: SonicWall SonicOS  

    Rated at 9.8 for severity, CVE-2024-40766 represents an improper access control vulnerability within the administrative interface of SonicWall’s SonicOS. This vulnerability has garnered the attention of managed security firms like Arctic Wolf, which report that ransomware groups such as Fog and Akira are exploiting it in SSL VPN environments to infiltrate networks.   

    CVE-2024-47575 and CVE-2024-23113: Fortinet FortiOS and FortiManager  

    Fortinet has been targeted by threat actors exploiting two vulnerabilities, both rated at 9.8. CVE-2024-47575, also known as “FortiJump,” allows attackers to execute arbitrary code through specially crafted requests in FortiManager. Concerns had arisen about Fortinet’s delay in disclosing this zero-day vulnerability prior to its public announcement on October 23.

    While Fortinet did notify some customers of a vulnerability in FortiManager with recommended mitigations, reports indicate that not all customers received this communication, highlighting a potential gap in the advisory process.  

    Furthermore, CVE-2024-23113 affects multiple versions of FortiOS, FortiProxy, FortiPAM, and FortiSwitchManager, allowing remote, unauthenticated attackers to execute arbitrary code.   

    CVE-2024-9264: Grafana Labs  

    The vulnerability, rated at 9.4, CVE-2024-9264, concerns the SQL Expressions feature in Grafana Labs’ open-source analytics and monitoring platform. This vulnerability allows for command injection and local file inclusion due to insufficient sanitization of user input in ‘duckdb’ queries.  

    CVE-2024-51567 and CVE-2024-51568: CyberPanel  

    CyberPanel has recently faced severe vulnerabilities rated at 10.0, CVE-2024-51567, and CVE-2024-51568. The first vulnerability allows attackers to bypass authentication and execute arbitrary commands, leading to significant exploitation in recent ransomware attacks. The second vulnerability involves a command injection flaw that poses serious risks to server management.   

    CVE-2024-46483: Xlight FTP Server  

    This critical integer overflow vulnerability affects the Xlight FTP Server, potentially allowing attackers to exploit packet parsing logic leading to heap overflows. With the availability of public Proof of Concepts (PoCs), this vulnerability could be weaponized in various attack campaigns.  

    Recommendations and Mitigations  

    To mitigate the risks posed by these vulnerabilities, organizations are encouraged to adopt the following best practices:  

    1. Ensure all software and hardware systems receive the latest patches from official vendors.  
    2. Implement an organized approach to inventory management, patch assessment, testing, deployment, and verification.  
    3. Isolate critical assets using firewalls, VLANs, and access controls to reduce the attack surface.  
    4. Create and maintain an incident response plan, testing it regularly to adapt to emerging threats.  
    5. Employ comprehensive monitoring solutions to detect and analyze suspicious activities in real-time.  
    6. Keep abreast of advisories from vendors, CERTs, and other sources to quickly address vulnerabilities.  
    7. Engage in vulnerability assessments and penetration testing to identify and remediate weaknesses.  

    Conclusion

    The vulnerabilities identified this week highlight the need for organizations to prioritize the patching of critical IT vulnerabilities. With the increasing chatter about these exploits on dark web forums, security teams must remain vigilant and proactive.   

    Implementing better security practices is essential to safeguard sensitive data and maintain the integrity of systems against online threats. The vulnerabilities in Fortinet, SonicWall, and Grafana Labs represent just a fraction of the risks that IT environments face today, making immediate action imperative. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleFBI Establishes 24/7 Command Post for Election Day Security Amid Cyber and Safety Concerns
    Next Article Effortless Data Updates in Salesforce: Leveraging the Update Record Function in LWC

    Related Posts

    Machine Learning

    Salesforce AI Releases BLIP3-o: A Fully Open-Source Unified Multimodal Model Built with CLIP Embeddings and Flow Matching for Image Understanding and Generation

    May 16, 2025
    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Open AI Releases PaperBench: A Challenging Benchmark for Assessing AI Agents’ Abilities to Replicate Cutting-Edge Machine Learning Research

    Machine Learning

    How Can Cloud-Native Architecture Enhance Your DevOps Practices

    Development

    Site not secure/connection not secure page automation UFT

    Development

    Top GitHub Repositories Every CTO Should Keep an Eye On

    Web Development

    Highlights

    Development

    How to Debug and Prevent Buffer Overflows in Embedded Systems

    March 17, 2025

    Buffer overflows are one of the most serious software bugs, especially in embedded systems, where…

    Researchers Uncover Vulnerabilities in AI-Powered Azure Health Bot Service

    August 13, 2024

    ChatGPT just made it easy to find and edit all the AI images you’ve ever generated

    April 16, 2025

    New EU Cyber Rules Highlights Gaps in Security and ‘Paper-Compliance’

    November 6, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.