SUNNYVALE, Calif., February 20, 2013 ? Fortinet® (NASDAQ: FTNT) − a world leader in high-performance network security – today announced the company’s FortiGuard Labs has identified critical zero-day vulnerabilities in Adobe Shockwave Player. Fortinet's FortiGuard Labs consist of over 175 researchers and analysts world-wide, working to discover, monitor and help protect against breaking threats. Since 2008, FortiGuard Labs has reported more than 150 zero day vulnerabilities, 124 of which have been fixed by the appropriate vendors. For a list of outstanding vulnerabilities FortiGuard has discovered that are in zero-day state, please visit: http://www.fortiguard.com/advisory/UpcomingAdvisories.html.
The vulnerabilities discovered in the Adobe Shockwave Player/AIR (CVE-2013-0635 and CVE-2013-0636) could allow an attacker, who successfully exploits these vulnerabilities, to run malicious code on the affected system. They were reported in November 2012. Adobe recommends users of Adobe Shockwave Player 184.108.40.2068 and earlier versions update to the newest version 220.127.116.11, available here: http://get.adobe.com/shockwave/
A zero day vulnerability is a previously unknown threat that does not yet have a patch/update available from the vendor to close the security hole, thus leaving it open to attack. Once a zero day vulnerability has been identified, it is analyzed by FortiGuard Labs and verified internally before vendors are notified. Once verified, FortiGuard Labs will develop an advanced zero-day IPS signature(s) that will be deployed to customers before a vendor patch is available, which helps protect against the open security hole(s). These signatures are unique to Fortinet and play an important role in the fight against advanced persistent threats (APTs).
In addition to analyzing the threat landscape, FortiGuard Labs researchers write and present papers at global security conferences, including EICAR, Blackhat, Virus Bulletin, Insomni'Hack and Hashdays. Published papers and presentations from these shows can be downloaded from here: http://www.fortiguard.com/resources/ResearchPapers.html
FortiGuard Labs’ responsible disclosure dictates a discovered vulnerability be patched before being disclosed to the public. Even without a working exploit or patch, a signature for the vulnerability can be generated to prevent intrusions. Once a signature is created, it is put through FortiGuard Labs’ zero day signature process and assigned a generic name. The goal is to provide protection while disclosing as few details as possible. From there, FortiGuard works together with vendors to create a patch for the vulnerability. After a patch is released, FortiGuard continues to work with the vendor to analyze the source of the vulnerability and to help prevent similar zero days from being exploited in the future.
As malware numbers have increased exponentially in recent years, network security vendors have had to find alternate methods for malware detection and mitigation. Fortinet, for example, has incorporated several new protective features and functionalities into its new operating system, FortiOS 5. FortiOS 5 includes more than 150 new security features that are designed to help protect against today’s Advanced Persistent Threats (APTs) and targeted attacks. These enhancements include four key elements, which give large enterprise organizations and managed security service providers the ability to easily deploy maximum protection: