Fortinet has recently announced a severe vulnerability in certain firewalls and web proxies: CVE-2022-40684 allows an unauthenticated attacker to remotely access admin controls from outside the network, posing a serious security threat to unpatched devices.
Thankfully, the fix is straightforward: the latest released patches for these products will eliminate the exploit. Therefore, patching these devices as quickly as possible should be a priority for any organization that uses them.
What you should do:
Talk to your IT provider right away and validate whether this vulnerability affects your network. The exploit will only affect certain Fortinet products (listed in the announcement linked above), so your top priority should be to identify whether your organization uses any of them: if it does, you should then move to patch as quickly as possible.
Mytech’s clients do not need to take any further action: we are aware of this vulnerability and are already addressing it. If you have any further questions, please don’t hesitate to reach out.
What Mytech is doing:
As stated above, Mytech is already at work ensuring the security of any of our clients who may be affected by this vulnerability. In addition to validating your security and applying patches to keep you safe, we also employ several mitigation strategies to deter unauthorized access. As a best practice, Mytech does not allow public exposure to admin-level interfaces, stopping access before the vulnerability can even be reached.
Although this vulnerability is known and the solution is straightforward, circumstances can change rapidly in any ongoing vulnerability announcement. For future updates, follow our Security Alerts page.