Cyberthreat Advisories | 1898 & Co.

Critical Vulnerabilities in Fortinet NGFW and Siemens Systems

Written by The 1898 & Co. Team | April 14, 2025

Recent cybersecurity developments have highlighted critical vulnerabilities affecting Fortinet Next-Generation Firewalls (NGFW) and Siemens systems. A series of vulnerabilities, including CVE-2024-3596, have been identified in Fortinet NGFW versions up to 7.4.5. These vulnerabilities, with CVSS scores as high as 9.1, pose significant risks due to their potential to allow unauthorized access and control over affected systems. The vulnerabilities include improper enforcement of message integrity and stack-based buffer overflow, which could lead to severe data breaches or system disruptions.

Additionally, Siemens has reported multiple vulnerabilities across its product lines, emphasizing the need for robust network protection and adherence to operational guidelines for industrial security. These vulnerabilities include issues such as out-of-bounds read and weak authentication, which could be exploited to compromise system integrity and confidentiality. Siemens advises implementing their security recommendations and consulting Fortinet's security notifications for mitigation strategies.

The cybersecurity landscape continues to evolve with these emerging threats, underscoring the importance of proactive security measures. Organizations are urged to update their systems promptly and follow vendor-specific guidance to mitigate these risks. The collaboration between Fortinet and Siemens highlights the critical need for industry-wide cooperation in addressing these vulnerabilities and enhancing overall cybersecurity resilience.

Threats and Vulnerabilities

The Fortinet NGFW vulnerabilities, including CVE-2024-3596, present a high risk with a CVSS v4.0 score of 9.1. These vulnerabilities can be exploited remotely without user interaction, potentially leading to unauthorized access and control over network devices. The improper enforcement of message integrity during transmission is particularly concerning, as it could allow attackers to intercept and manipulate sensitive data.

Siemens systems are affected by several vulnerabilities, such as CWE-125 (out-of-bounds read) and CWE-1390 (weak authentication). These issues could enable attackers to gain unauthorized access or disrupt system operations. The vulnerabilities have varying CVSS scores, with some reaching up to 9.0, indicating a critical impact on affected systems.

Industries relying on Fortinet and Siemens products, particularly those in critical infrastructure sectors, are at heightened risk. Known exploits leveraging these vulnerabilities could lead to significant operational disruptions and data breaches if not addressed promptly.

Client Impact

Clients using Fortinet NGFW or Siemens systems may face operational disruptions due to these vulnerabilities. The potential for unauthorized access and data manipulation could result in data breaches, financial losses, and reputational damage. Organizations in critical infrastructure sectors are particularly vulnerable, given the potential impact on essential services.

From a compliance perspective, these vulnerabilities could lead to regulatory challenges if exploited. Organizations may face audits or penalties for failing to protect sensitive data adequately. It is crucial for clients to assess their exposure to these vulnerabilities and implement necessary mitigations to maintain compliance with relevant regulations.

Mitigations

To mitigate the identified risks, clients should consider the following actions:

  1. Update all Fortinet NGFW systems to the latest version beyond 7.4.5 to address known vulnerabilities.
  2. Implement Siemens' operational guidelines for industrial security to enhance network protection.
  3. Regularly consult Fortinet's security notifications and subscribe to their RSS feed for timely updates.
  4. Conduct thorough vulnerability assessments to identify and address potential weaknesses in your systems.
  5. Employ network segmentation and access controls to limit the impact of potential breaches.
  6. Train staff on cybersecurity best practices to reduce the risk of human error contributing to security incidents.

By taking these steps, organizations can significantly reduce their exposure to these vulnerabilities. Continuous monitoring and timely updates are essential components of an effective cybersecurity strategy, helping to safeguard against evolving threats.

1898 & Co. Response

1898 & Co is actively addressing the current threat landscape by offering tailored cybersecurity services designed to mitigate emerging threats like those affecting Fortinet and Siemens systems. Our team provides comprehensive vulnerability assessments and remediation strategies to help clients secure their networks against these critical vulnerabilities.

We are enhancing our security protocols by incorporating the latest threat intelligence and collaborating with industry leaders to develop robust defense mechanisms. Our ongoing research efforts focus on identifying new attack vectors and developing innovative solutions to counteract them effectively.

Through our alliances with industry partners and government agencies, we strive to deliver cutting-edge cybersecurity solutions that meet the unique needs of our clients. Our commitment to continuous improvement ensures that we remain at the forefront of cybersecurity innovation, providing clients with the tools they need to protect their critical assets.

Sources

  1. Fortinet Security Advisories
  2. Siemens Industrial Security Guidelines
  3. CVE Details for CVE-2024-3596