Fortinet Advises Immediate Upgrade to Fix Critical FortiSwitch Vulnerability
Fortinet is advising FortiSwitch users to urgently update their firmware to fix a critical vulnerability that could be exploited by a remote attacker to modify administrative passwords. The vulnerability is tracked as CVE-2024-4887, has a CVSS base score of 9.3, and was discovered internally by Daniel Rozeboom of the FortiSwitch web UI development team. The vulnerability is present in FortiSwitch GUI and can be exploited remotely by sending a specially crafted request. Users have been advised to upgrade to a patched version as soon as possible to prevent exploitation. Vulnerabilities in Fortinet products are regularly targeted by threat actors, although at the time of issuing the security alert, Fortinet was unaware of any instances of attempted exploitation in the wild. If immediate patching is not possible, Fortinet recommends disabling HTTP/HTTPS Access from administrative interfaces and configuring trusted hosts to limit the hosts that can connect to the system. Affected Versions Fixed versions FortiSwitch 7.6.0 FortiSwitch 7.6.1 and above FortiSwitch 7.4.0 to 7.4.4 FortiSwitch...
Hi-School Pharmacy Agrees to Settle Data Breach Lawsuit for $600,000
The Vancouver, WA-based drug store chain Hi-School Pharmacy has agreed to settle a class action data breach lawsuit over a November 2023 data breach. A $600,000 settlement fund will be created to cover attorneys’ fees, legal costs and expenses, and class members’ claims. Hi-School Pharmacy experienced network disruption on November 3, 2024, and confirmed on November 21, 2023, that hackers had accessed its network and potentially obtained the personal information of current and former employees, including their names, dates of birth, and Social Security numbers. Individual notification letters were mailed to the 17,676 affected individuals in December 2023. In January 2024, a lawsuit – Shayna Marie Landin v Hi-School Pharmacy Services, LLC; Hi-School Pharmacy, Inc. – was filed in the U.S. District Court for the Western District of Washington alleging the pharmacy chain was negligent due to the failure to implement reasonable and appropriate cybersecurity measures to prevent unauthorized access to sensitive data. The plaintiffs alleged that the pharmacy chain should...
House Committee Hears New Concerns About Legacy Medical Device Cybersecurity
A House Energy and Commerce Committee Subcommittee on Oversight hearing last week explored the current cybersecurity challenges associated with legacy medical devices. Legacy medical devices are any medical device that cannot be reasonably protected against current cybersecurity threats, including patient monitors, infusion pumps, intracardiac defibrillators, mobile cardiac telemetry, pacemakers, intrathecal pain pumps, and imaging devices. The problem is that medical device hardware can remain functional for 10 to 30 years; however, the life cycles of the medical device software are much shorter. Once software reaches end of life and security updates stop being provided, vulnerabilities will no longer be fixed. If the devices continue to be used, threat actors will have ample time to find and exploit vulnerabilities, and since medical devices are usually network-connected, a successful attack on a legacy device can allow a threat actor to access internal networks. When the software reaches end of life, medical devices need to be replaced; however, cash-strapped hospitals lack the...
Survey Reveals Potential Issue In How HIPAA Knowledge is Tested
One of the key takeaways from the 2024/25 HIPAA Journal Annual Survey was that, although the majority of respondents provide annual HIPAA refresher training and regular security awareness training – and test workforce members during or after training – the way(s) in which workforce HIPAA knowledge is tested may be inadequate to prevent avoidable data breaches. The 2024/25 HIPAA Journal Annual Survey revealed an interesting mix of compliance best practices and compliance challenges. One of the least surprising statistics – considering that participants in the survey subscribe to the HIPAA Journal newsletter and are more likely to be “HIPAA aware” – is that 94.3% of participating organizations provide annual HIPAA refresher training to members of the workforce. However, only 79.3% of participating organizations said they test workforce members on HIPAA knowledge and awareness, and only 58.7% of participating organizations said the tests were certified. These statistics imply that some organizations are “going through the motions” of complying with the HIPAA training requirements and...
Ivanti Connect Secure, Policy Secure, ZTA Gateways Flaw Under Active Exploitation
A vulnerability affecting Ivanti Connect Secure, Policy Secure, Neurons for ZTA Gateways, and Pulse Connect Secure is being actively exploited by a China-nexus threat actor, according to a recent alert from the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The stack-based buffer overflow vulnerability is tracked as CVE-2025-22457 and is rated critical, with a CVSS v3.1 base score of 9.0. Successful exploitation of the vulnerability can lead to remote code execution by an unauthenticated threat actor, allowing them to take full control of an affected system. Mandiant reports that the vulnerability has been exploited in attacks on legacy VPNs by a threat actor tracked as UNC5221. Malware was deployed after exploiting the vulnerability, and Mandiant has also observed the threat actor attempting to modify the Integrity Checker Tool to avoid detection. The vulnerability affects the following products: Pulse Connect Secure (version 9.1x, which reached end-of-support December 31, 2024) Ivanti Connect Secure (version 22.7R2.5 and earlier) Policy Secure and Neurons for ZTA...



