Fortinet & Ivanti Patch High-Severity Vulnerabilities—Here’s What IT Leaders Need to Know

October’s Patch Tuesday brought critical updates from Fortinet and Ivanti, addressing dozens of vulnerabilities across their product lines. While no active exploitation has been reported, the nature of these flaws—ranging from privilege escalation to authentication bypass—makes timely patching essential.

As an IT strategist focused on infrastructure security and risk mitigation, I see this as a prime opportunity to reinforce patch hygiene and vendor oversight across enterprise environments.

🔐 Fortinet Highlights

Fortinet released 29 advisories covering 30+ vulnerabilities, including:

  • CVE-2025-54988 (FortiDLP) Exploits Apache Tika to read sensitive data or send malicious requests.
  • CVE-2025-53951 & CVE-2025-54658 (FortiDLP) Privilege escalation to LocalService or Root via crafted requests.
  • CVE-2025-58325 (FortiOS) Authenticated attackers can execute system commands.
  • CVE-2024-33507 (FortiIsolator) Crafted cookies can deauthenticate admins or grant write access.
  • CVE-2025-57741 (FortiClientMac) LaunchDaemon flaw enables privilege escalation.
  • CVE-2025-49201 (FortiPAM & FortiSwitchManager) Authentication bypass via brute-force attack.

🛠️ Additional patches span FortiProxy, FortiManager, FortiWeb, FortiSOAR, and more—covering risks like DLL hijacking, XSS, DoS, and arbitrary code execution.

📱 Ivanti Highlights

Ivanti patched multiple high-severity flaws in:

  • Endpoint Manager Mobile (EPMM) Authenticated admin users could execute arbitrary code or write to disk.
  • Neurons for MDM
    • Admins could unenroll devices, removing them from management UI.
    • MFA bypass exploitable by remote authenticated attackers.
    • API flaw exposed sensitive user info to unauthenticated actors.

Ivanti confirmed no known exploitation but emphasized urgency in applying patches.

🧭 Final Thoughts

Whether you’re managing FortiOS firewalls or Ivanti’s endpoint platforms, this month’s updates are a reminder that proactive patching is the frontline of defense. Don’t wait for exploitation—act now.

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.